Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In the 'SetUserPassword()' function, the 'newPassword' parameter is directly embedded in a shell command string using 'sprintf()' without any sanitisation or validation, and then executed using 'system()'. This allows an attacker to inject arbitrary shell commands that will be executed with the same privileges as the application.
History

Tue, 02 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Tue, 02 Dec 2025 13:15:00 +0000

Type Values Removed Values Added
Description Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In the 'SetUserPassword()' function, the 'newPassword' parameter is directly embedded in a shell command string using 'sprintf()' without any sanitisation or validation, and then executed using 'system()'. This allows an attacker to inject arbitrary shell commands that will be executed with the same privileges as the application.
Title Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50
First Time appeared Sge-plc1000 Sge-plc50
Sge-plc1000 Sge-plc50 circutor
Weaknesses CWE-121
CPEs cpe:2.3:a:sge-plc1000_sge-plc50:circutor:9.0.2:*:*:*:*:*:*:*
Vendors & Products Sge-plc1000 Sge-plc50
Sge-plc1000 Sge-plc50 circutor
References
Metrics cvssV4_0

{'score': 8.5, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:L/VA:H/SC:H/SI:L/SA:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: INCIBE

Published:

Updated: 2025-12-02T13:36:41.564Z

Reserved: 2025-10-15T12:06:16.258Z

Link: CVE-2025-11786

cve-icon Vulnrichment

Updated: 2025-12-02T13:36:38.157Z

cve-icon NVD

Status : Received

Published: 2025-12-02T13:15:50.493

Modified: 2025-12-02T13:15:50.493

Link: CVE-2025-11786

cve-icon Redhat

No data.