Metrics
Affected Vendors & Products
Mon, 05 Jan 2026 10:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gmg137
Gmg137 snap7-rs |
|
| Vendors & Products |
Gmg137
Gmg137 snap7-rs |
Tue, 30 Dec 2025 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 30 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was identified in gmg137 snap7-rs up to 153d3e8c16decd7271e2a5b2e3da4d6f68589424. Affected by this issue is the function snap7_rs::client::S7Client::download of the file client.rs. Such manipulation leads to heap-based buffer overflow. The attack can be executed remotely. The exploit is publicly available and might be used. This product implements a rolling release for ongoing delivery, which means version information for affected or updated releases is unavailable. The project was informed of the problem early through an issue report but has not responded yet. | |
| Title | gmg137 snap7-rs client.rs download heap-based overflow | |
| Weaknesses | CWE-119 CWE-122 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published: 2025-12-30T12:02:09.529Z
Updated: 2025-12-30T12:53:26.556Z
Reserved: 2025-12-29T08:36:50.869Z
Link: CVE-2025-15247
Updated: 2025-12-30T12:53:21.316Z
Status : Awaiting Analysis
Published: 2025-12-30T12:15:45.110
Modified: 2025-12-31T20:43:05.160
Link: CVE-2025-15247
No data.
ReportizFlow