漏洞描述 在5.0.7之前的Kamailio和5.1.4之前的5.1.x中,带有无效Via头的精心制作的SIP消息会导致分割错误并崩溃Kamailio。 原因是在crcitt_string_array核心函数中缺少用于计算To标记的CRC哈希的输入验证。 (check_via_address核心函数中还存在一个额外的错误:该函数也没有输入验证。) 这可能导致拒绝服务和可能执行任意代码。
相关漏洞推荐 POC CVE-2025-28242: DAEnetIP4 METO v1.25 - Session Hijacking POC CVE-2025-56132: LiquidFiles < 4.2 - User Enumeration via Password Reset POC CVE-2020-15081: PrestaShop < 1.7.6.6 - Information Exposure via Upload Directory POC CVE-2020-26935: phpMyAdmin < 5.0.3 - SQL Injection POC CVE-2020-5722: Grandstream UCM6200 - SQL Injection POC CVE-2024-23055: Plone Docker - Host Header Injection POC CVE-2025-11580: PowerJob List - Authorization Bypass POC CVE-2025-13418: Responsive Pricing Table <= 5.1.12 - Cross-Site Scripting POC CVE-2025-27817: Apache Kafka Client - Arbitrary File Read POC CVE-2025-3472: Ocean Extra <= 2.4.6 - Unauthenticated Shortcode Execution POC CVE-2025-36845: Eveo URVE Web Manager - Server-Side Request Forgery POC CVE-2025-49533: Adobe Experience Manager Forms - Insecure Deserialization POC CVE-2025-52694: Advantech WISE-IoTSuite/SaaS - SQL Injection