Stack-based Buffer Overflow Vulnerability in SonicOS SSLVPN by SonicWall
CVE-2025-40601

7.5HIGH

Key Information:

Vendor

Sonicwall

Status
Vendor
CVE Published:
20 November 2025

Badges

👾 Exploit Exists📰 News Worthy

What is CVE-2025-40601?

The SonicOS SSLVPN service has a stack-based buffer overflow vulnerability that enables a remote, unauthenticated attacker to exploit the affected system. This vulnerability can lead to a Denial of Service (DoS) condition, potentially causing the impacted firewall to crash, disrupting the network security and availability for users. It is crucial for organizations using SonicOS to apply available security updates and mitigate risks associated with this vulnerability.

Affected Version(s)

SonicOS Linux 7.3.0-7012 and older versions

SonicOS Linux 8.0.2-8011 and older versions

News Articles

New SonicWall SonicOS flaw allows hackers to crash firewalls

American cybersecurity company SonicWall urged customers today to patch a high-severity SonicOS SSLVPN security flaw that can allow attackers to crash vulnerable firewalls.

4 hours ago

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • 👾

    Exploit known to exist

  • 📰

    First article discovered by BleepingComputer

  • Vulnerability published

  • Vulnerability Reserved

Credit

Saikiran Madugula of SonicWall
.
CVE-2025-40601 : Stack-based Buffer Overflow Vulnerability in SonicOS SSLVPN by SonicWall