- Description
- A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.
- Source
- info@cert.vde.com
- NVD status
- Awaiting Analysis
CVSS 3.1
- Type
- Primary
- Base score
- 8.8
- Impact score
- 5.9
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
- info@cert.vde.com
- CWE-787
- Hype score
- Not currently trending
CVE-2025-41766 Stack-Based Buffer Overflow in ubr-network Method Enables Remote Device Compromise https://t.co/iFByoQG5iw
@VulmonFeeds
9 Mar 2026
32 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
We have just added an important vulnerability affecting MBS UBR-01 Mk II and other products (CVE-2025-41766) https://t.co/KuIMyF1zjy
@vuldb
9 Mar 2026
81 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🟠 CVE-2025-41766 - High A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise. https://t.co/SzOtMhZKKM https://t.co/7WMc8W6y4C
@TheHackerWire
9 Mar 2026
71 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[CVE-2025-41766: HIGH] A low-privileged remote attacker can trigger a stack-based buffer overflow via a crafted HTTP POST request using the ubr-network method resulting in full device compromise.#cve,CVE-2025-41766,#cybersecurity https://t.co/CSIInCvDTU
@CveFindCom
9 Mar 2026
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes