Stack Buffer Overwrite Vulnerability in wolfSSL SFTP Server
CVE-2025-11624

1.8LOW

Key Information:

Vendor

Wolfssh

Status
Vendor
CVE Published:
21 October 2025

What is CVE-2025-11624?

A vulnerability exists in the wolfSSL SFTP server that can be exploited by sending a specially crafted malicious packet. This packet has a handle size that exceeds the system's handle or file descriptor size but is still smaller than the maximum handle size allowed. Exploiting this flaw could lead to a stack buffer overwrite, potentially allowing an attacker to execute arbitrary code or disrupt normal operations of the server. It is crucial for users to apply necessary security patches to safeguard their systems against this vulnerability.

Affected Version(s)

wolfSSH 1.3.0 <= 1.4.20

References

CVSS V4

Score:
1.8
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
Low
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
Unknown

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Stanislav Fort of Aisle Research
.
CVE-2025-11624 : Stack Buffer Overwrite Vulnerability in wolfSSL SFTP Server