Cyber Posture

CVE-2025-1587

MediumPublic PoC

Published: 23 February 2025

Published
23 February 2025
Modified
14 May 2025
KEV Added
Patch
CVSS Score 5.3 CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
EPSS Score 0.0003 8.4th percentile
Risk Priority 11 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-1587 is a medium-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Razormist Telecom Billing Management System. Its CVSS base score is 5.3 (Medium).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Privilege Escalation (T1068); ranked at the 8.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Privilege Escalation (T1068). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly validates name and phonenumber inputs to the addrecords function, preventing buffer overflow from improper input sizes or formats.

prevent

Implements memory protections like DEP and ASLR to block exploitation of the buffer overflow vulnerability even if triggered.

prevent

Requires timely remediation of the known buffer overflow flaw in main.cpp via patching or updates for the Telecom Billing Management System.

MITRE ATT&CK Enterprise TechniquesAI

T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

The local buffer overflow vulnerability (CWE-120) in the addrecords function of main.cpp enables arbitrary code execution via uncontrolled input to name/phonenumber fields, facilitating exploitation for privilege escalation.

NVD Description

A vulnerability was found in SourceCodester Telecom Billing Management System 1.0. It has been rated as critical. This issue affects the function addrecords of the file main.cpp of the component Add New Record. The manipulation of the argument name/phonenumber leads…

more

to buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used. Other parameters might be affected as well.

Deeper analysisAI

CVE-2025-1587 is a buffer overflow vulnerability in SourceCodester Telecom Billing Management System 1.0, published on 2025-02-23. The issue affects the addrecords function in the main.cpp file of the Add New Record component, where manipulation of the name or phonenumber arguments triggers the flaw. Rated as critical with a CVSS v3.1 base score of 5.3 (AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L), it is linked to CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer) and CWE-120 (Buffer Copy without Checking Size of Input).

The vulnerability requires local access for exploitation, allowing an attacker with low privileges to manipulate the affected arguments and trigger a buffer overflow. Successful exploitation can lead to limited impacts on confidentiality, integrity, and availability, potentially enabling unauthorized data access, modification, or denial of service within the local scope.

Advisories referenced in VulDB entries (ctiid.296567, id.296567, submit.505363) and a GitHub issue (wshRE/CVE/issues/1) detail the vulnerability, with the exploit publicly disclosed and potentially usable. The vendor site at sourcecodester.com may provide additional context, though specific patch or mitigation guidance is not detailed in the available information. Other parameters might also be affected.

Details

CWE(s)

Affected Products

razormist
telecom billing management system
1.0

CVEs Like This One

CVE-2026-1109Shared CWE-119, CWE-120
CVE-2026-6563Shared CWE-119, CWE-120
CVE-2026-1108Shared CWE-119, CWE-120
CVE-2026-1110Shared CWE-119, CWE-120
CVE-2025-1372Shared CWE-119, CWE-120
CVE-2026-2980Shared CWE-119, CWE-120
CVE-2026-7750Shared CWE-119, CWE-120
CVE-2026-7288Shared CWE-119, CWE-120
CVE-2026-3698Shared CWE-119, CWE-120
CVE-2026-1686Shared CWE-119, CWE-120

References