CVE-2018-25125
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-11-14

Last updated on: 2025-11-14

Assigner: VulnCheck

Description
Netis ADSL Router DL4322D firmware RTK 2.1.1 contains a buffer overflow vulnerability in the embedded FTP service that allows an authenticated remote user to trigger a denial of service. After logging in to the FTP service, sending an FTP command such as ABOR with an excessively long argument causes the service, and in practice the router, to crash or become unresponsive, resulting in a loss of availability for the device and connected users.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-11-14
Last Modified
2025-11-14
Generated
2026-05-07
AI Q&A
2025-11-15
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
netis adsl_router_dl4322d 2.1.1
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a buffer overflow in the embedded FTP service of the Netis ADSL Router DL4322D firmware RTK 2.1.1. An authenticated remote user can exploit this by sending an FTP command like ABOR with an excessively long argument, which causes the FTP service and the router to crash or become unresponsive.


How can this vulnerability impact me? :

Exploiting this vulnerability results in a denial of service, causing the router and its FTP service to crash or become unresponsive. This leads to a loss of availability for the device and all users connected to it.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart