Kamailio 5.5 src/core/rvalue.c rve_is_constant Kari na aiki ⚔ [Gaskiya ba a tabbatar da shi ba]

Hakika vulnerability da aka rarraba a matsayin karshewa an gano a Kamailio 5.5. Tabbas, aikin rve_is_constant ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil src/core/rvalue.c, a cikin sashi $software_component. Wuro manipulation ga Kari na aiki. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-476. Lalle, rauni an sanar da shi 10/25/2025. Ana samun bayanin tsaro don saukewa a shimo.im. Ana kiran wannan rauni da CVE-2025-12206. Wuroo ka a yiɗi a yi ɗum e gese. Bayani na fasaha ga. Kuma, akwai exploit. Exploit ɗin an bayyana wa jama'a, za a iya amfani da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro. Á yí huɗɗi-na-gaskiya. Za a iya samun exploit a shimo.im. 0-day ga, an ndiyam a wuro be $0-$5k. Wannan haɗarin gaskiya har yanzu ana shakkar wanzuwarsa a yanzu. An kuma rubuta wannan vulnerability a wasu kundin bayanan vulnerability: Tenable (271818). If you want to get best quality of vulnerability data, you may have to visit VulDB.

6 Goyarwa · 103 Datenpunkte

FurɗeGargadi 1/5
10/27/2025 04:57
Gargadi 2/5
10/27/2025 05:50
Gargadi 3/5
10/29/2025 04:00
Gargadi 4/5
11/01/2025 20:48
Gargadi 5/5
11/04/2025 00:05
software_nameKamailioKamailioKamailioKamailioKamailio
software_version5.55.55.55.55.5
software_filesrc/core/rvalue.csrc/core/rvalue.csrc/core/rvalue.csrc/core/rvalue.csrc/core/rvalue.c
software_functionrve_is_constantrve_is_constantrve_is_constantrve_is_constantrve_is_constant
vulnerability_cweCWE-476 (Kari na aiki)CWE-476 (Kari na aiki)CWE-476 (Kari na aiki)CWE-476 (Kari na aiki)CWE-476 (Kari na aiki)
vulnerability_risk11111
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/
source_cveCVE-2025-12206CVE-2025-12206CVE-2025-12206CVE-2025-12206CVE-2025-12206
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avLLLLL
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore1.71.71.71.71.7
cvss2_vuldb_tempscore1.51.51.51.51.5
cvss3_vuldb_basescore3.33.33.33.33.3
cvss3_vuldb_tempscore3.03.03.03.03.0
cvss3_meta_basescore3.33.34.04.04.0
cvss3_meta_tempscore3.13.13.93.93.9
cvss4_vuldb_bscore4.84.84.84.84.8
cvss4_vuldb_btscore1.91.91.91.91.9
advisory_date1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avLLLLL
cvss4_cna_acLLLLL
cvss4_cna_atNNNNN
cvss4_cna_prLLLLL
cvss4_cna_uiNNNNN
cvss4_cna_vcNNNNN
cvss4_cna_viNNNNN
cvss4_cna_vaLLLLL
cvss4_cna_scNNNNN
cvss4_cna_siNNNNN
cvss4_cna_saNNNNN
cvss4_cna_bscore4.84.84.84.84.8
cvss3_cna_avLLLLL
cvss3_cna_acLLLLL
cvss3_cna_prLLLLL
cvss3_cna_uiNNNNN
cvss3_cna_sUUUUU
cvss3_cna_cNNNNN
cvss3_cna_iNNNNN
cvss3_cna_aLLLLL
cvss3_cna_basescore3.33.33.33.33.3
cvss2_cna_avLLLLL
cvss2_cna_acLLLLL
cvss2_cna_auSSSSS
cvss2_cna_ciNNNNN
cvss2_cna_iiNNNNN
cvss2_cna_aiPPPPP
cvss2_cna_basescore1.71.71.71.71.7
euvd_idEUVD-2025-36070EUVD-2025-36070EUVD-2025-36070EUVD-2025-36070
cvss3_nvd_avLLL
cvss3_nvd_acLLL
cvss3_nvd_prLLL
cvss3_nvd_uiNNN
cvss3_nvd_sUUU
cvss3_nvd_cNNN
cvss3_nvd_iNNN
cvss3_nvd_aHHH
cvss3_nvd_basescore5.55.55.5
nessus_id271818271818
nessus_nameLinux Distros Unpatched Vulnerability : CVE-2025-12206Linux Distros Unpatched Vulnerability : CVE-2025-12206
advisory_disputed1
source_mischttps://www.openwall.com/lists/oss-security/2025/11/02/3
decision_summaryThis attack requires manipulating config files which might not be a realistic scenario in many cases.

Interested in the pricing of exploits?

See the underground prices here!