Home

Description

Stack-based buffer overflow vulnerability in Circutor SGE-PLC1000/SGE-PLC50 v9.0.2. In the 'showMeterReport()' function, there is an unlimited user input that is copied to a fixed-size buffer via 'sprintf()'. The 'GetParameter(meter)' function retrieves the user input, which is directly incorporated into a buffer without size validation. An attacker can provide an excessively large input for the “meter” parameter.

PUBLISHED Reserved 2025-10-15 | Published 2025-12-02 | Updated 2025-12-02 | Assigner INCIBE




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
unaffected

9.0.2
affected

Credits

Gabriel Gonzalez and Sergio Ruiz finder

References

www.incibe.es/...ultiple-vulnerabilities-circutor-products-0

cve.org (CVE-2025-11780)

nvd.nist.gov (CVE-2025-11780)

Download JSON