CVE-2025-62691

Received
Published: 25 Nov 2025, 08:15
Last modified:25 Nov 2025, 08:15

Vulnerability Summary

Overall Risk
Medium Risk
39/100
CVSS Score
9.8 CRITICAL
CVSS v3.0 (VULTURES)
EPSS Score
0.23% INFO
0% probability
CISA KEV
Not listed
Ransomware
No reports
Exploits
None found
Dark Web
Not detected
Security Point (Windows) of MaLion and MaLionCloud contains a stack-based buffer overflow vulnerability in processing HTTP headers. Receiving a specially crafted request from a remote unauthenticated attacker could lead to arbitrary code execution with SYSTEM privilege.
Source Identifier: vultures@jpcert.or.jp
CVSSSourceSeverityExploit.ImpactVector
v4.0vultures@jpcert.or.jp9.3 CRITICALNANA
CVSS:4.0/AV:N/AC:L/AT:N/P...
v3.1n/a
v3.0vultures@jpcert.or.jp9.8 CRITICAL3.95.9
CVSS:3.0/AV:N/AC:L/PR:N/U...
v2.0n/a
0.23%
Current Score
45%ile
Percentile Rank
Loading chart...
Loading chart...
Stack-based Buffer Overflow CWE-121
Description:A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).

Not listed in CISA Known Exploited Vulnerabilities catalog.

No dark web activity detected for this vulnerability.

No known public exploit code indexed (as of 25 Nov 2025, 08:15).

Exploitation status can change quickly once PoC code appears.

No affected systems information available.

© 2025 CveMate. All rights reserved.v0.1.4