Heap-based Buffer Overflow in SMA100 Series Web Interface by SonicWall
CVE-2025-40597

7.5HIGH

Key Information:

Vendor

Sonicwall

Vendor
CVE Published:
23 July 2025

Badges

đź“° News Worthy

What is CVE-2025-40597?

A vulnerability in the SMA100 series web interface permits an unauthenticated remote attacker to exploit a heap-based buffer overflow. This issue can lead to Denial of Service (DoS) conditions and could potentially enable the execution of arbitrary code, making it critical for users of impacted products to ensure timely updates and mitigations.

Affected Version(s)

SMA 100 Series Linux 10.2.1.15-81sv and earlier versions

News Articles

Researchers Uncover N-day Vulnerabilities in SonicWall SMA100 Series

The vulnerabilities, disclosed on July 28, 2025, affect firmware version 10.2.1.15 and highlight persistent issues with HTTP header parsing in network security devices.

Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities

Security researchers have disclosed technical details of three previously patched vulnerabilities affecting SonicWall's SMA100 series SSL-VPN appliances.

Stack Overflows, Heap Overflows, and Existential Dread (SonicWall SMA100 CVE-2025-40596, CVE-2025-40597 and CVE-2025-40598)

It’s 2025, and at this point, we’re convinced there’s a secret industry-wide pledge: every network appliance must include at least one trivially avoidable HTTP header parsing bug - preferably pre-auth. Bonus points if it involves sscanf. If that’s the case, well done! SonicWall’s SMA100 series

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • đź“°

    First article discovered by watchTowr Labs

  • Vulnerability published

  • Vulnerability Reserved

Credit

Sina Kheirkhah
.