Tech »  Topic »  Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities

Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities


Security researchers have disclosed technical details of three previously patched vulnerabilities affecting SonicWall’s SMA100 series SSL-VPN appliances, highlighting concerning pre-authentication security flaws that could have enabled remote code execution and cross-site scripting attacks.

The vulnerabilities, all confirmed against firmware version 10.2.1.15, underscore persistent challenges in network appliance security despite decades of awareness around common programming pitfalls.

Critical Pre-Authentication Buffer Overflows Discovered

The research team from watchTowr Labs identified two distinct buffer overflow vulnerabilities that could be triggered without authentication, both stemming from inadequate input validation in HTTP request processing.

The first vulnerability, CVE-2025-40596, represents a stack-based buffer overflow in the httpd binary responsible for handling incoming HTTP requests to the SSL-VPN service.

CVE ID Type Authentication Required Severity Impact
CVE-2025-40596 Stack-based Buffer Overflow No Remote Code Execution
CVE-2025-40597 Heap-based Buffer Overflow No Remote Code Execution
CVE-2025-40598 Reflected Cross-Site Scripting No (User Interaction Required) Session Hijacking

This ...


Copyright of this story solely belongs to gbhackers . To see the full text click HERE