CVE-2025-1547

Dec. 10, 2025, 4:06 p.m.

7.5
High

Description

A stack-based buffer overflow vulnerability [CWE-121] in WatchGuard Fireware OS's certificate request command could allow an authenticated privileged user to execute arbitrary code via specially crafted CLI commands.This issue affects Fireware OS: from 12.0 through 12.5.12+701324, from 12.6 through 12.11.2.

Product(s) Impacted

Vendor Product Versions
Watchguard
  • Fireware
  • Firebox M270
  • Firebox M290
  • Firebox M370
  • Firebox M390
  • Firebox M440
  • Firebox M4600
  • Firebox M470
  • Firebox M4800
  • Firebox M5600
  • Firebox M570
  • Firebox M5800
  • Firebox M590
  • Firebox M670
  • Firebox M690
  • Firebox Nv5
  • Firebox T20
  • Firebox T25
  • Firebox T40
  • Firebox T45
  • Firebox T55
  • Firebox T70
  • Firebox T80
  • Firebox T85
  • Fireboxcloud
  • Fireboxv
  • Firebox T15
  • Firebox T35
  • *
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -
  • -

Weaknesses

Common security weaknesses mapped to this vulnerability.

CWE-121
Stack-based Buffer Overflow
A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

*CPE(s)

Affected systems and software identified for this CVE.

Type Vendor Product Version Update Edition Language Software Edition Target Software Target Hardware Other Information
o watchguard fireware / / / / / / / /
h watchguard firebox_m270 - / / / / / / /
h watchguard firebox_m290 - / / / / / / /
h watchguard firebox_m370 - / / / / / / /
h watchguard firebox_m390 - / / / / / / /
h watchguard firebox_m440 - / / / / / / /
h watchguard firebox_m4600 - / / / / / / /
h watchguard firebox_m470 - / / / / / / /
h watchguard firebox_m4800 - / / / / / / /
h watchguard firebox_m5600 - / / / / / / /
h watchguard firebox_m570 - / / / / / / /
h watchguard firebox_m5800 - / / / / / / /
h watchguard firebox_m590 - / / / / / / /
h watchguard firebox_m670 - / / / / / / /
h watchguard firebox_m690 - / / / / / / /
h watchguard firebox_nv5 - / / / / / / /
h watchguard firebox_t20 - / / / / / / /
h watchguard firebox_t25 - / / / / / / /
h watchguard firebox_t40 - / / / / / / /
h watchguard firebox_t45 - / / / / / / /
h watchguard firebox_t55 - / / / / / / /
h watchguard firebox_t70 - / / / / / / /
h watchguard firebox_t80 - / / / / / / /
h watchguard firebox_t85 - / / / / / / /
h watchguard fireboxcloud - / / / / / / /
h watchguard fireboxv - / / / / / / /
o watchguard fireware / / / / / / / /
h watchguard firebox_t15 - / / / / / / /
h watchguard firebox_t35 - / / / / / / /

CVSS Score

7.5 / 10

CVSS Data - 4.0

  • Attack Vector: NETWORK
  • Attack Complexity: HIGH
  • Attack Requirements: PRESENT
  • Privileges Required: HIGH
  • User Interaction: NONE
  • Scope:
  • Confidentiality Impact: HIGH
  • Integrity Impact: HIGH
  • Availability Impact: HIGH
  • Exploit Maturity: NOT_DEFINED
  • CVSS:4.0/AV:N/AC:H/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

    View Vector String

Timeline

Published: Dec. 4, 2025, 10:15 p.m.
Last Modified: Dec. 10, 2025, 4:06 p.m.

Status : Analyzed

CVE has had analysis completed and all data associations made.

More info

Source

5d1c2695-1a31-4499-88ae-e847036fd7e3

*Disclaimer: Some vulnerabilities do not have an associated CPE. To enhance the data, we use AI to infer CPEs based on CVE details. This is an automated process and might not always be accurate.