Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      This week in AI updates: Mistral’s new Le Chat features, ChatGPT updates, and more (September 5, 2025)

      September 6, 2025

      Designing For TV: Principles, Patterns And Practical Guidance (Part 2)

      September 5, 2025

      Neo4j introduces new graph architecture that allows operational and analytics workloads to be run together

      September 5, 2025

      Beyond the benchmarks: Understanding the coding personalities of different LLMs

      September 5, 2025

      Development Release: KDE Linux 20250906

      September 6, 2025

      Hitachi Energy Pledges $1B to Strengthen US Grid, Build Largest Transformer Plant in Virginia

      September 5, 2025

      How to debug a web app with Playwright MCP and GitHub Copilot

      September 5, 2025

      Between Strategy and Story: Thierry Chopain’s Creative Path

      September 5, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      Health Monitoring Android App using SQLite

      September 7, 2025
      Recent

      Health Monitoring Android App using SQLite

      September 7, 2025

      Convertedbook – Live LaTeX Preview in the Browser

      September 7, 2025

      Why browsers throttle JavaScript timers (and what to do about it)

      September 6, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Speed Isn’t Everything When Buying SSDs – Here’s What Really Matters!

      September 8, 2025
      Recent

      Speed Isn’t Everything When Buying SSDs – Here’s What Really Matters!

      September 8, 2025

      14 Themes for Beautifying Your Ghostty Terminal

      September 8, 2025

      Development Release: KDE Linux 20250906

      September 6, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Security»Common Vulnerabilities and Exposures (CVEs)»CVE-2025-3854 – H3C GR-3000AX HTTP POST Request Handler Buffer Overflow Vulnerability

    CVE-2025-3854 – H3C GR-3000AX HTTP POST Request Handler Buffer Overflow Vulnerability

    April 21, 2025

    CVE ID : CVE-2025-3854

    Published : April 22, 2025, 1:15 a.m. | 29 minutes ago

    Description : A vulnerability, which was classified as critical, was found in H3C GR-3000AX up to V100R006. Affected is the function EnableIpv6/UpdateWanModeMulti/UpdateIpv6Params/EditWlanMacList/Edit_List_SSID of the file /goform/aspForm of the component HTTP POST Request Handler. The manipulation of the argument param leads to buffer overflow. The attack needs to be initiated within the local network. The exploit has been disclosed to the public and may be used. It is recommended to upgrade the affected component. Other functions might be affected as well.

    Severity: 8.0 | HIGH

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Source: Read More

    Facebook Twitter Reddit Email Copy Link
    Previous ArticleCVE-2025-3856 – Xxyopen Novel-Plus SQL Injection Vulnerability
    Next Article CVE-2025-3850 – YXJ2018 SpringBoot-Vue-OnlineExam Remote Authentication Bypass Vulnerability

    Related Posts

    Development

    Under lock and key: Safeguarding business data with encryption

    September 7, 2025
    Development

    Malicious npm Packages Impersonate Flashbots, Steal Ethereum Wallet Keys

    September 7, 2025
    Leave A Reply Cancel Reply

    For security, use of Google's reCAPTCHA service is required which is subject to the Google Privacy Policy and Terms of Use.

    Continue Reading

    Copilot Arena: A Platform for Code

    Copilot Arena: A Platform for Code

    Machine Learning

    CVE-2025-49007 – Apache Rack Denial of Service Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    LaunchDarkly adds new features to help developers release faster while mitigating risk

    Tech & Work

    the bridal beauty team

    Web Development

    Highlights

    CVE-2025-38344 – Intel ACPI Cache Leak

    July 10, 2025

    CVE ID : CVE-2025-38344

    Published : July 10, 2025, 9:15 a.m. | 4 hours, 51 minutes ago

    Description : In the Linux kernel, the following vulnerability has been resolved:

    ACPICA: fix acpi parse and parseext cache leaks

    ACPICA commit 8829e70e1360c81e7a5a901b5d4f48330e021ea5

    I’m Seunghun Han, and I work for National Security Research Institute of
    South Korea.

    I have been doing a research on ACPI and found an ACPI cache leak in ACPI
    early abort cases.

    Boot log of ACPI cache leak is as follows:
    [ 0.352414] ACPI: Added _OSI(Module Device)
    [ 0.353182] ACPI: Added _OSI(Processor Device)
    [ 0.353182] ACPI: Added _OSI(3.0 _SCP Extensions)
    [ 0.353182] ACPI: Added _OSI(Processor Aggregator Device)
    [ 0.356028] ACPI: Unable to start the ACPI Interpreter
    [ 0.356799] ACPI Error: Could not remove SCI handler (20170303/evmisc-281)
    [ 0.360215] kmem_cache_destroy Acpi-State: Slab cache still has objects
    [ 0.360648] CPU: 0 PID: 1 Comm: swapper/0 Tainted: G W
    4.12.0-rc4-next-20170608+ #10
    [ 0.361273] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
    virtual_box 12/01/2006
    [ 0.361873] Call Trace:
    [ 0.362243] ? dump_stack+0x5c/0x81
    [ 0.362591] ? kmem_cache_destroy+0x1aa/0x1c0
    [ 0.362944] ? acpi_sleep_proc_init+0x27/0x27
    [ 0.363296] ? acpi_os_delete_cache+0xa/0x10
    [ 0.363646] ? acpi_ut_delete_caches+0x6d/0x7b
    [ 0.364000] ? acpi_terminate+0xa/0x14
    [ 0.364000] ? acpi_init+0x2af/0x34f
    [ 0.364000] ? __class_create+0x4c/0x80
    [ 0.364000] ? video_setup+0x7f/0x7f
    [ 0.364000] ? acpi_sleep_proc_init+0x27/0x27
    [ 0.364000] ? do_one_initcall+0x4e/0x1a0
    [ 0.364000] ? kernel_init_freeable+0x189/0x20a
    [ 0.364000] ? rest_init+0xc0/0xc0
    [ 0.364000] ? kernel_init+0xa/0x100
    [ 0.364000] ? ret_from_fork+0x25/0x30

    I analyzed this memory leak in detail. I found that “Acpi-State” cache and
    “Acpi-Parse” cache were merged because the size of cache objects was same
    slab cache size.

    I finally found “Acpi-Parse” cache and “Acpi-parse_ext” cache were leaked
    using SLAB_NEVER_MERGE flag in kmem_cache_create() function.

    Real ACPI cache leak point is as follows:
    [ 0.360101] ACPI: Added _OSI(Module Device)
    [ 0.360101] ACPI: Added _OSI(Processor Device)
    [ 0.360101] ACPI: Added _OSI(3.0 _SCP Extensions)
    [ 0.361043] ACPI: Added _OSI(Processor Aggregator Device)
    [ 0.364016] ACPI: Unable to start the ACPI Interpreter
    [ 0.365061] ACPI Error: Could not remove SCI handler (20170303/evmisc-281)
    [ 0.368174] kmem_cache_destroy Acpi-Parse: Slab cache still has objects
    [ 0.369332] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G W
    4.12.0-rc4-next-20170608+ #8
    [ 0.371256] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
    virtual_box 12/01/2006
    [ 0.372000] Call Trace:
    [ 0.372000] ? dump_stack+0x5c/0x81
    [ 0.372000] ? kmem_cache_destroy+0x1aa/0x1c0
    [ 0.372000] ? acpi_sleep_proc_init+0x27/0x27
    [ 0.372000] ? acpi_os_delete_cache+0xa/0x10
    [ 0.372000] ? acpi_ut_delete_caches+0x56/0x7b
    [ 0.372000] ? acpi_terminate+0xa/0x14
    [ 0.372000] ? acpi_init+0x2af/0x34f
    [ 0.372000] ? __class_create+0x4c/0x80
    [ 0.372000] ? video_setup+0x7f/0x7f
    [ 0.372000] ? acpi_sleep_proc_init+0x27/0x27
    [ 0.372000] ? do_one_initcall+0x4e/0x1a0
    [ 0.372000] ? kernel_init_freeable+0x189/0x20a
    [ 0.372000] ? rest_init+0xc0/0xc0
    [ 0.372000] ? kernel_init+0xa/0x100
    [ 0.372000] ? ret_from_fork+0x25/0x30
    [ 0.388039] kmem_cache_destroy Acpi-parse_ext: Slab cache still has objects
    [ 0.389063] CPU: 1 PID: 1 Comm: swapper/0 Tainted: G W
    4.12.0-rc4-next-20170608+ #8
    [ 0.390557] Hardware name: innotek gmb_h virtual_box/virtual_box, BIOS
    virtual_box 12/01/2006
    [ 0.392000] Call Trace:
    [ 0.392000] ? dump_stack+0x5c/0x81
    [ 0.392000] ? kmem_cache_destroy+0x1aa/0x1c0
    [ 0.392000] ? acpi_sleep_proc_init+0x27/0x27
    [ 0.392000] ? acpi_os_delete_cache+0xa/0x10
    [ 0.392000] ? acpi_ut_delete_caches+0x6d/0x7b
    [ 0.392000] ? acpi_terminate+0xa/0x14
    [ 0.392000] ? acpi_init+0x2af/0x3
    —truncated—

    Severity: 0.0 | NA

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    CVE-2025-1331 – IBM CICS TX Buffer Overflow Vulnerability

    May 8, 2025

    CVE-2025-48054 – Radashi Prototype Pollution Vulnerability

    May 27, 2025

    CVE-2025-47651 – Infility Global SQL Injection

    June 9, 2025
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.