CVE-2025-1587
Published: 23 February 2025
Summary
CVE-2025-1587 is a medium-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Razormist Telecom Billing Management System. Its CVSS base score is 5.3 (Medium).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 8.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly validates name and phonenumber inputs to the addrecords function, preventing buffer overflow from improper input sizes or formats.
Implements memory protections like DEP and ASLR to block exploitation of the buffer overflow vulnerability even if triggered.
Requires timely remediation of the known buffer overflow flaw in main.cpp via patching or updates for the Telecom Billing Management System.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
The local buffer overflow vulnerability (CWE-120) in the addrecords function of main.cpp enables arbitrary code execution via uncontrolled input to name/phonenumber fields, facilitating exploitation for privilege escalation.
NVD Description
A vulnerability was found in SourceCodester Telecom Billing Management System 1.0. It has been rated as critical. This issue affects the function addrecords of the file main.cpp of the component Add New Record. The manipulation of the argument name/phonenumber leads…
more
to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.
Deeper analysisAI
CVE-2025-1587 is a buffer overflow vulnerability in SourceCodester Telecom Billing Management System 1.0, published on 2025-02-23. The issue affects the addrecords function in the main.cpp file of the Add New Record component, where manipulation of the name or phonenumber arguments triggers the flaw. Rated as critical with a CVSS v3.1 base score of 5.3 (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), it is linked to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-120 (Buffer Copy without Checking Size of Input).
The vulnerability requires local access for exploitation, allowing an attacker with low privileges to manipulate the affected arguments and trigger a buffer overflow. Successful exploitation can lead to limited impacts on confidentiality, integrity, and availability, potentially enabling unauthorized data access, modification, or denial of service within the local scope.
Advisories referenced in VulDB entries (ctiid.296567, id.296567, submit.505363) and a GitHub issue (wshRE/CVE/issues/1) detail the vulnerability, with the exploit publicly disclosed and potentially usable. The vendor site at sourcecodester.com may provide additional context, though specific patch or mitigation guidance is not detailed in the available information. Other parameters might also be affected.
Details
- CWE(s)