CVE-2025-11678
BaseFortify
Publication date: 2025-10-20
Last updated on: 2025-10-21
Assigner: Nozomi Networks Inc.
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| warmcat | libwebsockets | 4.4.2 |
| warmcat | libwebsockets | 4.1 |
| warmcat | libwebsockets | 4.3.6 |
| warmcat | libwebsockets | 4.2 |
| warmcat | libwebsockets | 4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack-based buffer overflow in the lws_adns_parse_label function of warmcat libwebsockets. It occurs when the LWS_WITH_SYS_ASYNC_DNS flag is enabled during compilation. An attacker who can sniff a DNS request can craft a malicious DNS response with a label longer than the maximum allowed, causing the label_stack to overflow.
How can this vulnerability impact me? :
The vulnerability can lead to a stack-based buffer overflow, which may allow an attacker to execute arbitrary code, cause a denial of service, or crash the application using warmcat libwebsockets with the affected configuration.