CVE-2025-37169
Analyzed
Analyzed - Analysis Complete
BaseFortify
Publication date: 2026-01-13
Last updated on: 2026-02-25
Assigner: Hewlett Packard Enterprise (HPE)
Description
Description
A stack overflow vulnerability exists in the AOS-10 web-based management interface of a Mobility Gateway. Successful exploitation could allow an authenticated malicious actor to execute arbitrary code as a privileged user on the underlying operating system.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| arubanetworks | arubaos | From 10.3.0.0 (inc) to 10.4.1.10 (exc) |
| arubanetworks | arubaos | From 10.5.0.0 (inc) to 10.7.2.2 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a stack overflow in the AOS-10 web-based management interface of a Mobility Gateway. It allows an authenticated malicious user to execute arbitrary code with privileged access on the underlying operating system.
How can this vulnerability impact me? :
Exploitation of this vulnerability could allow an attacker with valid credentials to run arbitrary code as a privileged user, potentially leading to full system compromise, data loss, or disruption of services.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70