Vulnerability Description
A vulnerability has been found in MikroTik RouterOS 7. This affects the function parse_json_element of the file /rest/ip/address/print of the component libjson.so. The manipulation leads to buffer overflow. The attack is possible to be carried out remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.20.1 and 7.21beta2 mitigates this issue. You should upgrade the affected component. The vendor replied: "Our bug tracker reports that your issue has been fixed. This means that we plan to release a RouterOS update with this fix. Make sure to upgrade to the next release when it comes out."
CVSS Score
HIGH
Related Weaknesses (CWE)
References
- https://github.com/a2ure123/libjson-unicode-buffer-overflow-poc
- https://github.com/a2ure123/libjson-unicode-buffer-overflow-poc#technical-proof-
- https://vuldb.com/?ctiid.325818
- https://vuldb.com/?id.325818
- https://vuldb.com/?submit.652387
- https://github.com/a2ure123/libjson-unicode-buffer-overflow-poc
FAQ
What is CVE-2025-10948?
CVE-2025-10948 is a vulnerability with a CVSS score of 8.8 (HIGH). A vulnerability has been found in MikroTik RouterOS 7. This affects the function parse_json_element of the file /rest/ip/address/print of the component libjson.so. The manipulation leads to buffer ove...
How severe is CVE-2025-10948?
CVE-2025-10948 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-10948?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.