Buffer Overflow Vulnerability in H3C GR-3000AX Router
CVE-2025-3854

8.6HIGH

Key Information:

Vendor
H3c
Status
Vendor
CVE Published:
22 April 2025

Badges

👾 Exploit Exists🟡 Public PoC

Summary

A buffer overflow vulnerability has been identified in the H3C GR-3000AX router, specifically within the HTTP POST Request Handler's functions such as EnableIpv6, UpdateWanModeMulti, UpdateIpv6Params, EditWlanMacList, and Edit_List_SSID. The vulnerability arises from improper handling of arguments in the /goform/aspForm file, enabling local attackers to manipulate parameters and execute malicious code. This exploitation requires access to the local network, making it critical for administrators to promptly update the affected firmware to prevent potential breaches.

Affected Version(s)

GR-3000AX V100R006

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V4

Score:
8.6
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Adjacent Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

Credit

BabyShark (VulDB User)
.