{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2025-15247","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-12-29T08:36:50.869Z","datePublished":"2025-12-30T12:02:09.529Z","dateUpdated":"2026-02-24T06:16:51.503Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2026-02-24T06:16:51.503Z"},"title":"gmg137 snap7-rs client.rs download heap-based overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-122","lang":"en","description":"Heap-based Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"gmg137","product":"snap7-rs","versions":[{"version":"153d3e8c16decd7271e2a5b2e3da4d6f68589424","status":"affected"}],"cpes":["cpe:2.3:a:gmg137:snap7-rs:*:*:*:*:*:*:*:*"]}],"descriptions":[{"lang":"en","value":"A vulnerability was identified in gmg137 snap7-rs up to 153d3e8c16decd7271e2a5b2e3da4d6f68589424. Affected by this issue is the function snap7_rs::client::S7Client::download of the file client.rs. Such manipulation leads to heap-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The project was informed of the problem early through an issue report but has not responded yet."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":6.9,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P","baseSeverity":"MEDIUM"}},{"cvssV3_1":{"version":"3.1","baseScore":7.3,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":7.3,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":7.5,"vectorString":"AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:ND/RC:UR"}}],"timeline":[{"time":"2025-12-29T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-12-29T01:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2026-01-12T15:29:53.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"VulDB Gitee Analyzer","type":"tool"}],"references":[{"url":"https://vuldb.com/?id.338637","name":"VDB-338637 | gmg137 snap7-rs client.rs download heap-based overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.338637","name":"VDB-338637 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://gitee.com/gmg137/snap7-rs/issues/ID2H7V","tags":["exploit","issue-tracking"]},{"url":"https://gitee.com/gmg137/snap7-rs/","tags":["product"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-12-30T12:53:07.304473Z","id":"CVE-2025-15247","options":[{"Exploitation":"poc"},{"Automatable":"yes"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-12-30T12:53:26.556Z"}}]}}