Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-14673: Heap-based Buffer Overflow in gmg137 snap7-rs

0
Medium
VulnerabilityCVE-2025-14673cvecve-2025-14673
Published: Sun Dec 14 2025 (12/14/2025, 17:32:10 UTC)
Source: CVE Database V5
Vendor/Project: gmg137
Product: snap7-rs

Description

A vulnerability has been found in gmg137 snap7-rs up to 1.142.1. Affected is the function snap7_rs::client::S7Client::as_ct_write of the file /tests/snap7-rs/src/client.rs. The manipulation leads to heap-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/24/2026, 23:01:09 UTC

Technical Analysis

CVE-2025-14673 identifies a heap-based buffer overflow vulnerability in the snap7-rs Rust library, versions 1.142.0 and 1.142.1. The vulnerability resides in the function snap7_rs::client::S7Client::as_ct_write located in the client.rs source file within the tests directory. The flaw arises from improper handling of input data leading to a heap buffer overflow condition. This vulnerability can be exploited remotely without any authentication or user interaction, increasing the attack surface. The snap7-rs library is a Rust binding for the Snap7 library, which is commonly used for communication with Siemens S7 PLCs (Programmable Logic Controllers) in industrial automation environments. An attacker exploiting this vulnerability could cause memory corruption, which may result in application crashes (denial of service) or potentially arbitrary code execution depending on the context and environment. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and partial impacts on confidentiality, integrity, and availability (VC:L, VI:L, VA:L). The vulnerability was publicly disclosed on December 14, 2025, and while no active exploits in the wild have been reported, the availability of exploit code increases the risk of future attacks. No official patches have been linked yet, so mitigation currently relies on workarounds and monitoring.

Potential Impact

The impact of CVE-2025-14673 is significant for organizations using snap7-rs in industrial control systems, especially those interfacing with Siemens S7 PLCs. Exploitation could lead to denial of service conditions, disrupting critical industrial processes and causing operational downtime. In worst-case scenarios, attackers might achieve arbitrary code execution, potentially allowing them to manipulate PLC operations, leading to safety hazards, production losses, or sabotage. The vulnerability's remote exploitability without authentication makes it particularly dangerous in environments where snap7-rs is exposed to untrusted networks or insufficiently segmented industrial networks. Given the critical role of industrial automation in manufacturing, energy, and infrastructure sectors, the threat could have cascading effects on supply chains and public safety. The medium severity rating reflects the balance between the ease of exploitation and the partial impact on system confidentiality, integrity, and availability.

Mitigation Recommendations

To mitigate CVE-2025-14673, organizations should first monitor for updates from the snap7-rs maintainers and apply patches as soon as they become available. In the absence of official patches, consider the following specific actions: 1) Restrict network access to systems running snap7-rs to trusted and segmented industrial networks, employing strict firewall rules and network segmentation to limit exposure. 2) Implement intrusion detection and prevention systems (IDS/IPS) tuned to detect anomalous traffic patterns or malformed packets targeting snap7-rs interfaces. 3) Conduct thorough input validation and sanitization on any data passed to snap7-rs functions if custom wrappers or integrations exist. 4) Employ runtime protections such as memory safety tools or sandboxing to limit the impact of potential exploitation. 5) Regularly audit and monitor logs for unusual activity related to snap7-rs communications. 6) Develop and test incident response plans specific to industrial control system compromises to minimize downtime and safety risks. These targeted mitigations go beyond generic advice by focusing on network controls, monitoring, and defensive coding practices relevant to the snap7-rs context.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-13T16:36:42.608Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 693ef8c5b0f1e1d5300e83c3

Added to database: 12/14/2025, 5:49:57 PM

Last enriched: 2/24/2026, 11:01:09 PM

Last updated: 3/24/2026, 4:32:56 AM

Views: 165

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses