Due to improper input validation, a buffer overflow vulnerability is present in
Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain
conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://community.silabs.com/068Vm00000WJZED |
![]() ![]() |
History
Fri, 17 Oct 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Fri, 17 Oct 2025 16:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Due to improper input validation, a buffer overflow vulnerability is present in Zigbee EZSP Host Applications. If the buffer overflows, stack corruption is possible. In certain conditions, this could lead to arbitrary code execution. Access to a network key is required to exploit this vulnerability. | |
Title | Zigbee Green Power Host Buffer Overflow Vulnerability | |
Weaknesses | CWE-20 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: Silabs
Published:
Updated: 2025-10-17T17:20:32.188Z
Reserved: 2025-07-31T13:35:54.376Z
Link: CVE-2025-8414

Updated: 2025-10-17T17:20:22.402Z

Status : Received
Published: 2025-10-17T16:15:39.413
Modified: 2025-10-17T16:15:39.413
Link: CVE-2025-8414

No data.

No data.