{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2025-6090","assignerOrgId":"1af790b2-7ee1-4545-860a-a788eba489b5","state":"PUBLISHED","assignerShortName":"VulDB","dateReserved":"2025-06-14T23:03:55.975Z","datePublished":"2025-06-15T14:31:04.690Z","dateUpdated":"2025-06-16T16:43:12.346Z"},"containers":{"cna":{"providerMetadata":{"orgId":"1af790b2-7ee1-4545-860a-a788eba489b5","shortName":"VulDB","dateUpdated":"2025-06-15T14:31:04.690Z"},"title":"H3C GR-5400AX aspForm UpdateIpv6params buffer overflow","problemTypes":[{"descriptions":[{"type":"CWE","cweId":"CWE-120","lang":"en","description":"Buffer Overflow"}]},{"descriptions":[{"type":"CWE","cweId":"CWE-119","lang":"en","description":"Memory Corruption"}]}],"affected":[{"vendor":"H3C","product":"GR-5400AX","versions":[{"version":"V100R009L50","status":"affected"}]}],"descriptions":[{"lang":"en","value":"A vulnerability was found in H3C GR-5400AX V100R009L50 and classified as critical. This issue affects the function UpdateWanparamsMulti/UpdateIpv6params of the file /routing/goform/aspForm. The manipulation of the argument param leads to buffer overflow. The attack may be initiated remotely. The exploit has been disclosed to the public and may be used. The vendor confirms the existence of this issue. Because they assess the risk as low, they do not have immediate plans for remediation."},{"lang":"de","value":"Eine kritische Schwachstelle wurde in H3C GR-5400AX V100R009L50 gefunden. Dies betrifft die Funktion UpdateWanparamsMulti/UpdateIpv6params der Datei /routing/goform/aspForm. Durch die Manipulation des Arguments param mit unbekannten Daten kann eine buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff kann über das Netzwerk passieren. Der Exploit steht zur öffentlichen Verfügung."}],"metrics":[{"cvssV4_0":{"version":"4.0","baseScore":8.7,"vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P","baseSeverity":"HIGH"}},{"cvssV3_1":{"version":"3.1","baseScore":8.8,"vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C","baseSeverity":"HIGH"}},{"cvssV3_0":{"version":"3.0","baseScore":8.8,"vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:U/RC:C","baseSeverity":"HIGH"}},{"cvssV2_0":{"version":"2.0","baseScore":9,"vectorString":"AV:N/AC:L/Au:S/C:C/I:C/A:C/E:POC/RL:U/RC:C"}}],"timeline":[{"time":"2025-06-14T02:00:00.000Z","lang":"en","value":"VulDB entry created"},{"time":"2025-06-15T00:00:00.000Z","lang":"en","value":"Advisory disclosed"},{"time":"2025-06-15T01:09:22.000Z","lang":"en","value":"VulDB entry last update"}],"credits":[{"lang":"en","value":"CH13hh (VulDB User)","type":"reporter"}],"references":[{"url":"https://vuldb.com/?id.312557","name":"VDB-312557 | H3C GR-5400AX aspForm UpdateIpv6params buffer overflow","tags":["vdb-entry","technical-description"]},{"url":"https://vuldb.com/?ctiid.312557","name":"VDB-312557 | CTI Indicators (IOB, IOC, IOA)","tags":["signature","permissions-required"]},{"url":"https://vuldb.com/?submit.587999","name":"Submit #587999 | H3C  H3C GR-5400AX V100R009L50 Buffer Overflow","tags":["third-party-advisory"]},{"url":"https://github.com/CH13hh/cve/blob/main/new/5.md","tags":["exploit"]}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2025-06-16T16:43:02.760055Z","id":"CVE-2025-6090","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-06-16T16:43:12.346Z"}}]}}