CVE-2025-11624
BaseFortify
Publication date: 2025-10-21
Last updated on: 2025-12-04
Assigner: wolfSSL Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| wolfssh | wolfssh | From 1.3.0 (inc) to 1.4.20 (inc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a potential stack buffer overwrite on the SFTP server side. It occurs when the server receives a malicious packet containing a handle size that is larger than the system's handle or file descriptor size but smaller than the maximum allowed handle size. This mismatch can lead to overwriting parts of the stack, potentially causing unexpected behavior or crashes.
How can this vulnerability impact me? :
The vulnerability can lead to a stack buffer overwrite, which may cause the SFTP server to behave unpredictably, crash, or potentially be exploited to execute arbitrary code. This could result in denial of service or unauthorized actions on the affected system.