Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

SonicWall SMA100 Series N-day Vulnerabilities Technical Details Revealed

Posted on July 29, 2025July 29, 2025 By CWS

A number of crucial vulnerabilities affecting SonicWall’s SMA100 sequence SSL-VPN home equipment, highlighting persistent safety flaws in community infrastructure units. 

The vulnerabilities, designated CVE-2025-40596, CVE-2025-40597, and CVE-2025-40598, show basic programming errors that allow pre-authentication assaults in opposition to firmware model 10.2.1.15.

Key Takeaways1. Stack overflow, heap overflow, and XSS in SonicWall SMA100 SSL-VPN units.2. Each overflows triggered with out authentication through malformed HTTP requests.3. Unsafe programming practices proceed in crucial community infrastructure.

CVE-2025-40596: Pre-Authentication Stack Buffer Overflow 

In response to WatchTower Labs’ evaluation, the vulnerability represents a basic stack-based buffer overflow triggered by malformed HTTP requests to the /__api__/ endpoint. 

The flaw throughout the /usr/src/EasyAccess/bin/httpd binary is liable for processing incoming SSL-VPN connections.

The weak code makes use of an unsafe sscanf operate name that parses user-controlled URI information with out correct bounds checking. 

When the system encounters requests starting with /__api__/, it copies consumer enter right into a 0x800-byte stack buffer situated at [rsp+898h+var_878] with out validating enter size.

Exploitation requires minimal effort, achievable by a easy Python one-liner: import requests; requests.get(“

Whereas stack safety mechanisms restrict quick exploitation potential, the vulnerability’s pre-authentication nature in an SSL-VPN context raises vital safety considerations.

CVE-2025-40597: Heap Overflow 

The second vulnerability impacts the mod_httprp.so module, seemingly standing for “HTTP Reverse Proxy,” which handles numerous SonicWall-specific HTTP parsing capabilities. 

This heap-based buffer overflow happens throughout Host header processing, demonstrating how even “safe” programming practices can fail when applied incorrectly.

The weak code allocates a 128-byte heap chunk through calloc(0x80, 1) earlier than passing it to __sprintf_chk. 

Regardless of utilizing the supposedly safer sprintf variant, builders handed -1 (0xFFFFFFFFFFFFFFFF) as the scale parameter, successfully disabling bounds checking solely.

This configuration permits attackers to overflow the allotted heap chunk by sending outsized Host headers: import requests; requests.get(“ headers={‘Host’:’A’*750}, confirm=False). 

The overflow corrupts adjoining heap metadata, probably enabling extra subtle exploitation methods.

CVE-2025-40598: Cross-site Scripting Flaw

The third vulnerability represents a simple mirrored cross-site scripting flaw within the radiusChallengeLogin CGI endpoint. 

The state parameter displays consumer enter instantly into HTTP responses with out sanitization or encoding.

Exploitation requires minimal sophistication:

CVETitleCVSS 3.1 ScoreSeverityCVE-2025-40596Pre-Authentication Stack-Primarily based Buffer Overflow7.3 HighCVE-2025-40597Pre-Authentication Heap-Primarily based Buffer Overflow7.5HighCVE-2025-40598Reflected Cross-Web site Scripting (XSS)6.1Medium

Notably, the SMA100’s Net Utility Firewall options seem disabled on administration interfaces, permitting even primary XSS payloads to execute efficiently.

These vulnerabilities underscore persistent safety challenges in community equipment growth, the place basic programming errors proceed enabling pre-authentication assaults in opposition to crucial infrastructure parts. 

SonicWall has revealed an advisory addressing these points by its Product Safety Incident Response Crew.

Organizations counting on SonicWall SMA100 sequence units ought to instantly apply out there patches and think about implementing further network-level protections till full remediation is achieved.

Combine ANY.RUN TI Lookup along with your SIEM or SOAR To Analyses Superior Threats -> Strive 50 Free Trial Searches

Cyber Security News Tags:Details, Nday, Revealed, Series, SMA100, SonicWall, Technical, Vulnerabilities

Post navigation

Previous Post: Seal Security Raises $13 Million to Secure Software Supply Chain
Next Post: CodeIgniter Vulnerability Exposes Million of Webapps to File Upload Attacks

Related Posts

Blockchain for Cybersecurity Real-World Applications and Limits Cyber Security News
Beware! Fake AI Video Generation Platforms Drop Stealer Malware on Your Computers Cyber Security News
10 Best Malware Analysis Tools Cyber Security News
Cloudflare Warns of DDoS Attacks Targeting Journalists and News Organizations Cyber Security News
New Echo Chamber Attack Jailbreaks Most AI Models by Weaponizing Indirect References Cyber Security News
SentinelOne Global Service Outage Root Cause Revealed Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild
  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps
  • Threat Actors Allegedly Claim Access to Nokia’s Internal Network
  • FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
  • Palo Alto Networks to Acquire CyberArk in $25 Billion Deal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New XWorm V6 Variant’s With Anti-Analysis Capabilities Attacking Windows Users in The Wild
  • Hackers Use Facebook Ads to Spread JSCEAL Malware via Fake Cryptocurrency Trading Apps
  • Threat Actors Allegedly Claim Access to Nokia’s Internal Network
  • FunkSec Ransomware Decryptor Released Free to Public After Group Goes Dormant
  • Palo Alto Networks to Acquire CyberArk in $25 Billion Deal

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News