CVE-2025-8414
BaseFortify
Publication date: 2025-10-17
Last updated on: 2025-10-21
Assigner: Silicon Graphics (SGI)
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| silicon_labs | zigbee_ezsp_host_applications | 4.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-20 | The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow in Zigbee EZSP Host Applications caused by improper input validation. When the buffer overflows, it can corrupt the stack, and under certain conditions, this may allow an attacker to execute arbitrary code. Exploiting this vulnerability requires access to a network key.
How can this vulnerability impact me? :
If exploited, this vulnerability can lead to stack corruption and potentially allow an attacker to execute arbitrary code on the affected system. This could compromise the security and integrity of the device or network using Zigbee EZSP Host Applications, especially since exploitation requires access to a network key.