CVE-2025-47335
MEDIUM
2026-01-07
[email protected]
6.7
CVSS 3.1
Share
CVSS Vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Local
Attack Complexity
Low
Privileges Required
High
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Lifecycle Timeline
3
Analysis Generated
Mar 12, 2026 - 21:54 vuln.today
Patch Released
Jan 27, 2026 - 21:43 nvd
Patch available
CVE Published
Jan 07, 2026 - 12:17 nvd
MEDIUM 6.7
Tags
Memory Corruption
Fastconnect 6700 Firmware
Sm6650 Firmware
Wsa8840 Firmware
Wsa8830 Firmware
Sm8650q Firmware
Sm8750p Firmware
Qcs6490 Firmware
Qcs615 Firmware
Qcm6490 Firmware
Wsa8835 Firmware
Wcd9378 Firmware
Qcs9100 Firmware
Wcn6650 Firmware
Wcn7860 Firmware
Sm8635 Firmware
Sm7635 Firmware
Qcs5430 Firmware
Video Collaboration Vc3 Platform Firmware
Qcm5430 Firmware
Fastconnect 7800 Firmware
Wcd9390 Firmware
Wcd9380 Firmware
Wcd9370 Firmware
Wcn7881 Firmware
Wcn6755 Firmware
Wsa8845h Firmware
Sm8735 Firmware
Qca6698aq Firmware
Sm8635p Firmware
Sm8750 Firmware
Wcn7861 Firmware
Qmp1000 Firmware
Wcd9375 Firmware
Wcd9395 Firmware
Wcd9385 Firmware
Wsa8832 Firmware
Sm7675 Firmware
Snapdragon 8 Gen 3 Mobile Platform Firmware
Wcn7750 Firmware
Fastconnect 6900 Firmware
Wcn7880 Firmware
Sm7635p Firmware
Sm7675p Firmware
Wsa8845 Firmware
Sm6650p Firmware
Description
Memory corruption while parsing clock configuration data for a specific hardware type.
Analysis
Memory corruption while parsing clock configuration data for a specific hardware type. [CVSS 6.7 MEDIUM]
Technical Context
Classified as CWE-120 (Classic Buffer Overflow). Affects Fastconnect 6700 Firmware. Memory corruption while parsing clock configuration data for a specific hardware type.
Affected Products
Vendor: Qualcomm. Product: Fastconnect 6700 Firmware. Versions: up to -.
Remediation
A vendor patch is available — apply it immediately. Enable ASLR, DEP/NX, and stack canaries where possible.
Priority Score
34
Low
Medium
High
Critical
KEV: 0
EPSS: +0.0
CVSS: +34
POC: 0
Share
External POC / Exploit Code
Leaving vuln.today
Destination URL
POC code from unknown sources may be malicious, contain backdoors, or be fake.
Always review and test exploit code in a safe, isolated environment (VM/sandbox).
Verify the source reputation and cross-reference with known databases (Exploit-DB, GitHub Security).