CVE-2025-4905

medium

Description

A vulnerability was found in iop-apl-uw basestation3 up to 3.0.4 and classified as problematic. This issue affects the function load_qc_pickl of the file basestation3/QC.py. The manipulation of the argument qc_file leads to deserialization. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. The code maintainer tagged the issue as closed. But there is no new commit nor release in the GitHub repository available so far.

References

https://vuldb.com/?submit.578074

https://vuldb.com/?id.309461

https://vuldb.com/?ctiid.309461

https://github.com/iop-apl-uw/basestation3/issues/6#issue-3066055868

https://github.com/iop-apl-uw/basestation3/issues/6#event-17672013757

https://github.com/iop-apl-uw/basestation3/issues/6

Details

Source: Mitre, NVD

Published: 2025-05-19

Updated: 2025-05-19

Risk Information

CVSS v2

Base Score: 4.3

Vector: CVSS2#AV:L/AC:L/Au:S/C:P/I:P/A:P

Severity: Medium

CVSS v3

Base Score: 5.3

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

Severity: Medium

CVSS v4

Base Score: 4.8

Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Severity: Medium

EPSS

EPSS: 0.00017