CVE-2026-32955
Received
Received - Intake
Stack-Based Buffer Overflow in Silex SD-330AC Enables Code Execution
Publication date: 2026-04-20
Last updated on: 2026-04-22
Assigner: JPCERT/CC
Description
Description
SD-330AC and AMC Manager provided by silex technology, Inc. contain a stack-based buffer overflow vulnerability in processing the redirect URLs. Arbitrary code may be executed on the device.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| silextechnology | sd-330ac_firmware | to 1.50 (exc) |
| silextechnology | amc_manager | to 5.1.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the SD-330AC and AMC Manager products provided by silex technology, Inc. It is a stack-based buffer overflow that occurs when processing redirect URLs.
Because of this flaw, an attacker may be able to execute arbitrary code on the affected device.
How can this vulnerability impact me? :
The vulnerability can allow an attacker to execute arbitrary code on the device remotely.
This could lead to unauthorized control over the device, potentially compromising its functionality, data, and security.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70