Home

Description

Due to improper input validation, a buffer overflow vulnerability is present in Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability.

PUBLISHED Reserved 2025-07-31 | Published 2025-10-17 | Updated 2025-10-17 | Assigner Silabs




CRITICAL: 9.4CVSS:4.0/AV:A/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H

Problem types

CWE-20 Improper Input Validation

Product status

Default status
unaffected

Any version
affected

Any version
affected

Default status
unaffected

Any version
affected

References

community.silabs.com/068Vm00000WJZED vendor-advisory permissions-required

cve.org (CVE-2025-8414)

nvd.nist.gov (CVE-2025-8414)

Download JSON