CVE-2025-49604

Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
CVSS

No CVSS.

References

No reference.

Configurations

No configuration.

History

22 Jul 2025, 15:15

Type Values Removed Values Added
CWE CWE-122
CPE cpe:2.3:a:realtek:ameba_arduino_sdk:*:*:*:*:*:*:*:*
cpe:2.3:a:realtek:ameba-rtos-d:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : 5.4
v2 : unknown
v3 : unknown
Summary
  • (es) En dispositivos Realtek AmebaD, se detectó un desbordamiento de búfer en el montón en Ameba-AIoT ameba-arduino-d anterior a la versión 3.1.9 y ameba-rtos-d anterior al commit c2bfd8216a1cbc19ad2ab5f48f372ecea756d67a el 03/07/2025. En la función de desfragmentación del controlador WLAN, la falta de validación del tamaño de las tramas Wi-Fi fragmentadas puede provocar un desbordamiento de búfer en el montón.
Summary (en) For Realtek AmebaD devices, a heap-based buffer overflow was discovered in Ameba-AIoT ameba-arduino-d before version 3.1.9 and ameba-rtos-d before commit c2bfd8216a1cbc19ad2ab5f48f372ecea756d67a on 2025/07/03. In the WLAN driver defragment function, lack of validation of the size of fragmented Wi-Fi frames may lead to a heap-based buffer overflow. (en) Rejected reason: DO NOT USE THIS CVE RECORD. ConsultIDs: none. Reason: This record was withdrawn by its CNA. Further investigation showed that it was not a security issue. Notes: none.
References
  • {'url': 'https://github.com/Ameba-AIoT/ameba-arduino-d/pull/281', 'tags': ['Patch'], 'source': 'cve@mitre.org'}
  • {'url': 'https://github.com/Ameba-AIoT/ameba-arduino-d/releases/tag/V3.1.9', 'tags': ['Release Notes'], 'source': 'cve@mitre.org'}
  • {'url': 'https://www.amebaiot.com/en/security-bulletin-cve-2025-49604/', 'tags': ['Broken Link'], 'source': 'cve@mitre.org'}

18 Jul 2025, 17:55

Type Values Removed Values Added
CPE cpe:2.3:a:realtek:ameba_arduino_sdk:*:*:*:*:*:*:*:*
cpe:2.3:a:realtek:ameba-rtos-d:*:*:*:*:*:*:*:*
First Time Realtek ameba-rtos-d
Realtek ameba Arduino Sdk
Realtek
References () https://github.com/Ameba-AIoT/ameba-arduino-d/pull/281 - () https://github.com/Ameba-AIoT/ameba-arduino-d/pull/281 - Patch
References () https://github.com/Ameba-AIoT/ameba-arduino-d/releases/tag/V3.1.9 - () https://github.com/Ameba-AIoT/ameba-arduino-d/releases/tag/V3.1.9 - Release Notes
References () https://www.amebaiot.com/en/security-bulletin-cve-2025-49604/ - () https://www.amebaiot.com/en/security-bulletin-cve-2025-49604/ - Broken Link

10 Jul 2025, 13:17

Type Values Removed Values Added
Summary
  • (es) En dispositivos Realtek AmebaD, se detectó un desbordamiento de búfer en el montón en Ameba-AIoT ameba-arduino-d anterior a la versión 3.1.9 y ameba-rtos-d anterior al commit c2bfd8216a1cbc19ad2ab5f48f372ecea756d67a el 03/07/2025. En la función de desfragmentación del controlador WLAN, la falta de validación del tamaño de las tramas Wi-Fi fragmentadas puede provocar un desbordamiento de búfer en el montón.

09 Jul 2025, 21:15

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 5.4
CWE CWE-122

09 Jul 2025, 16:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-07-09 16:15

Updated : 2025-07-22 15:15


NVD link : CVE-2025-49604

Mitre link : CVE-2025-49604

CVE.ORG link : CVE-2025-49604


JSON object : View

Products Affected

No product.

CWE

No CWE.