Description

SoftEtherVPN 5.02.5187 is vulnerable to Use after Free in the Command.c file via the CheckNetworkAcceptThread function. NOTE: the Supplier disputes this because the use-after-free is not in the VPN software, but is instead in a separate tool that has no untrusted input and runs under the user's own privileges (it is a stress-testing tool for a networking stack).

INFO

Published Date :

2025-03-12T00:00:00.000Z

Last Modified :

2025-07-19T01:24:27.272Z

Source :

mitre
AFFECTED PRODUCTS

The following products are affected by CVE-2025-25568 vulnerability.

Vendors Products
Softether
  • Vpn
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2025-25568.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact