Researchers Reveal Technical Details of SonicWall SMA100 Series N-Day Vulnerabilities
gbhackersSecurity researchers have disclosed technical details of three previously patched vulnerabilities affecting SonicWall’s SMA100 series SSL-VPN appliances, highlighting concerning pre-authentication security flaws that could have enabled remote code execution and cross-site scripting attacks.
The vulnerabilities, all confirmed against firmware version 10.2.1.15, underscore persistent challenges in network appliance security despite decades of awareness around common programming pitfalls.
Critical Pre-Authentication Buffer Overflows Discovered
The research team from watchTowr Labs identified two distinct buffer overflow vulnerabilities that could be triggered without authentication, both stemming from inadequate input validation in HTTP request processing.
The first vulnerability, CVE-2025-40596, represents a stack-based buffer overflow in the httpd binary responsible for handling incoming HTTP requests to the SSL-VPN service.
CVE ID | Type | Authentication Required | Severity Impact |
CVE-2025-40596 | Stack-based Buffer Overflow | No | Remote Code Execution |
CVE-2025-40597 | Heap-based Buffer Overflow | No | Remote Code Execution |
CVE-2025-40598 | Reflected Cross-Site Scripting | No (User Interaction Required) | Session Hijacking |
This ...
Copyright of this story solely belongs to gbhackers . To see the full text click HERE