Kamailio 5.5 src/core/rvalue.c rve_is_constant ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ ⚔ [ପଚରାଉଚରା]

Dogoggorri kan akka ସମସ୍ୟାଜନକ jedhamuun ramadame Kamailio 5.5 keessatti argameera. Miidhamni argame is hojii rve_is_constant faayilii src/core/rvalue.c keessa. Wanti jijjiirame gara ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ geessa. Rakkoo ibsuuf CWE yoo fayyadamte gara CWE-476 si geessa. Odeeffannoon kun yeroo 10/25/2025 maxxanfameera. Odeeffannoon kun buufachuuf shimo.im irratti argama. Dogoggorri kun CVE-2025-12206 jedhamee waamama. Weerara sun naannoo keessaatti qofa raawwatamuu qaba. Ibsa teeknikaa ni jira. Waan dabalataa ta’een, meeshaa balaa kana fayyadamuuf ni jira. Qorannoo miidhaa (exploit) uummataaf ifa taasifameera, kanaafis fayyadamuu ni danda'ama. Ammas, gatii exploit might be approx. USD $0-$5k yeroo ammaa irratti argamuu danda'a. ପ୍ରୁଫ୍-ଅଫ୍-କନ୍ସେପ୍ଟ ta’uu isaa ibsameera. Exploit shimo.im irraa buufachuun ni danda'ama. Akka 0-daytti, gatiin isaa daldala dhoksaa keessatti $0-$5k akka ta'e tilmaamameera. Jiraachuu balaa kanaa ammaaf hin mirkanaa’in jedhamee yaadama. Hanqinni kun bu'uuraalee odeeffannoo hanqina biroo keessatti argama: Tenable (271818). If you want to get best quality of vulnerability data, you may have to visit VulDB.

6 ଆଡାପ୍ଟେସନ୍ · 103 ପଏଣ୍ଟ

ଫିଲ୍ଡଅଦ୍ୟତନ 1/5
10/27/2025 04:57 AM
ଅଦ୍ୟତନ 2/5
10/27/2025 05:50 AM
ଅଦ୍ୟତନ 3/5
10/29/2025 04:00 AM
ଅଦ୍ୟତନ 4/5
11/01/2025 08:48 PM
ଅଦ୍ୟତନ 5/5
11/04/2025 12:05 AM
software_nameKamailioKamailioKamailioKamailioKamailio
software_version5.55.55.55.55.5
software_filesrc/core/rvalue.csrc/core/rvalue.csrc/core/rvalue.csrc/core/rvalue.csrc/core/rvalue.c
software_functionrve_is_constantrve_is_constantrve_is_constantrve_is_constantrve_is_constant
vulnerability_cweCWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)CWE-476 (ସେବା ପ୍ରତ୍ୟାଖ୍ୟାନ)
vulnerability_risk11111
cvss3_vuldb_avLLLLL
cvss3_vuldb_acLLLLL
cvss3_vuldb_prLLLLL
cvss3_vuldb_uiNNNNN
cvss3_vuldb_sUUUUU
cvss3_vuldb_cNNNNN
cvss3_vuldb_iNNNNN
cvss3_vuldb_aLLLLL
cvss3_vuldb_ePPPPP
cvss3_vuldb_rcRRRRR
advisory_urlhttps://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/
exploit_availability11111
exploit_publicity11111
exploit_urlhttps://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/https://shimo.im/docs/aBAYMVMB2jUP9jAj/
source_cveCVE-2025-12206CVE-2025-12206CVE-2025-12206CVE-2025-12206CVE-2025-12206
cna_responsibleVulDBVulDBVulDBVulDBVulDB
response_summaryThe vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.The vendor was contacted early about this disclosure but did not respond in any way.
cvss2_vuldb_avLLLLL
cvss2_vuldb_acLLLLL
cvss2_vuldb_ciNNNNN
cvss2_vuldb_iiNNNNN
cvss2_vuldb_aiPPPPP
cvss2_vuldb_ePOCPOCPOCPOCPOC
cvss2_vuldb_rcURURURURUR
cvss4_vuldb_avLLLLL
cvss4_vuldb_acLLLLL
cvss4_vuldb_prLLLLL
cvss4_vuldb_uiNNNNN
cvss4_vuldb_vcNNNNN
cvss4_vuldb_viNNNNN
cvss4_vuldb_vaLLLLL
cvss4_vuldb_ePPPPP
cvss2_vuldb_auSSSSS
cvss2_vuldb_rlNDNDNDNDND
cvss3_vuldb_rlXXXXX
cvss4_vuldb_atNNNNN
cvss4_vuldb_scNNNNN
cvss4_vuldb_siNNNNN
cvss4_vuldb_saNNNNN
cvss2_vuldb_basescore1.71.71.71.71.7
cvss2_vuldb_tempscore1.51.51.51.51.5
cvss3_vuldb_basescore3.33.33.33.33.3
cvss3_vuldb_tempscore3.03.03.03.03.0
cvss3_meta_basescore3.33.34.04.04.0
cvss3_meta_tempscore3.13.13.93.93.9
cvss4_vuldb_bscore4.84.84.84.84.8
cvss4_vuldb_btscore1.91.91.91.91.9
advisory_date1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)1761343200 (10/25/2025)
price_0day$0-$5k$0-$5k$0-$5k$0-$5k$0-$5k
cve_nvd_summaryA flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.A flaw has been found in Kamailio 5.5. The impacted element is the function rve_is_constant of the file src/core/rvalue.c. This manipulation causes null pointer dereference. The attack needs to be launched locally. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.
cvss4_cna_avLLLLL
cvss4_cna_acLLLLL
cvss4_cna_atNNNNN
cvss4_cna_prLLLLL
cvss4_cna_uiNNNNN
cvss4_cna_vcNNNNN
cvss4_cna_viNNNNN
cvss4_cna_vaLLLLL
cvss4_cna_scNNNNN
cvss4_cna_siNNNNN
cvss4_cna_saNNNNN
cvss4_cna_bscore4.84.84.84.84.8
cvss3_cna_avLLLLL
cvss3_cna_acLLLLL
cvss3_cna_prLLLLL
cvss3_cna_uiNNNNN
cvss3_cna_sUUUUU
cvss3_cna_cNNNNN
cvss3_cna_iNNNNN
cvss3_cna_aLLLLL
cvss3_cna_basescore3.33.33.33.33.3
cvss2_cna_avLLLLL
cvss2_cna_acLLLLL
cvss2_cna_auSSSSS
cvss2_cna_ciNNNNN
cvss2_cna_iiNNNNN
cvss2_cna_aiPPPPP
cvss2_cna_basescore1.71.71.71.71.7
euvd_idEUVD-2025-36070EUVD-2025-36070EUVD-2025-36070EUVD-2025-36070
cvss3_nvd_avLLL
cvss3_nvd_acLLL
cvss3_nvd_prLLL
cvss3_nvd_uiNNN
cvss3_nvd_sUUU
cvss3_nvd_cNNN
cvss3_nvd_iNNN
cvss3_nvd_aHHH
cvss3_nvd_basescore5.55.55.5
nessus_id271818271818
nessus_nameLinux Distros Unpatched Vulnerability : CVE-2025-12206Linux Distros Unpatched Vulnerability : CVE-2025-12206
advisory_disputed1
source_mischttps://www.openwall.com/lists/oss-security/2025/11/02/3
decision_summaryThis attack requires manipulating config files which might not be a realistic scenario in many cases.

Interested in the pricing of exploits?

See the underground prices here!