Heap-based Buffer Overflow Affecting snap7-rs package, versions >=0.0.0


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

Exploit Maturity
Proof of Concept
EPSS
0.07% (21st percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Heap-based Buffer Overflow vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-RUST-SNAP7RS-14417326
  • published15 Dec 2025
  • disclosed14 Dec 2025
  • creditUnknown

Introduced: 14 Dec 2025

CVE-2025-14672  (opens in a new tab)
CWE-122  (opens in a new tab)

How to fix?

There is no fixed version for snap7-rs.

Overview

snap7-rs is a Rust binding for the snap7 C++ library, statically linked to snap7 without requiring any additional dependencies.

Affected versions of this package are vulnerable to Heap-based Buffer Overflow via the ct_write function in client.rs file. An attacker can execute arbitrary code or cause a denial of service by sending specially crafted data to the affected process remotely.

CVSS Base Scores

version 4.0
version 3.1