A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occurs when a unauthenticated attacker send an oversized or unexpected username input. An overflow condition crashes the thread handling the login attempt, forcing the session to close. Because other CLI sessions remain unaffected, the impact is limited to a low‑severity availability disruption.
Metrics
Affected Vendors & Products
References
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-104 |
|
History
Wed, 18 Mar 2026 07:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow in the device's Telnet/SSH CLI login routine occurs when a unauthenticated attacker send an oversized or unexpected username input. An overflow condition crashes the thread handling the login attempt, forcing the session to close. Because other CLI sessions remain unaffected, the impact is limited to a low‑severity availability disruption. | |
| Title | Stack-Based Buffer Overflow in CLI Login Username Handling over CLI | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-03-18T13:32:24.892Z
Reserved: 2026-01-07T11:49:15.178Z
Link: CVE-2026-22321
No data.
Status : Received
Published: 2026-03-18T08:16:29.527
Modified: 2026-03-18T08:16:29.527
Link: CVE-2026-22321
No data.
OpenCVE Enrichment
No data.