Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2025-67246

EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2025-67246

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
A local information disclosure vulnerability exists in the Ludashi driver before 5.1025 due to a lack of access control in the IOCTL handler. This driver exposes a device interface accessible to a normal user and handles attacker-controlled structures containing the lower 4GB of physical addresses. The handler maps arbitrary physical memory via MmMapIoSpace and copies data back to user mode without verifying the caller's privileges or the target address range. This allows unprivileged users to read arbitrary physical memory, potentially exposing kernel data structures, kernel pointers, security tokens, and other sensitive information. This vulnerability can be further exploited to bypass the Kernel Address Space Layout Rules (KASLR) and achieve local privilege escalation.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Ludashi Driver 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Ludashi Driver是中国鲁大师(Ludashi)公司的一个驱动管理软件。 Ludashi Driver 5.1025之前版本存在安全漏洞,该漏洞源于IOCTL处理程序访问控制不当,可能导致读取任意物理内存和本地权限提升。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2025-67246

#POC DescriptionSource LinkShenlong Link
1CVE-2025-67246https://github.com/CDipper/CVE-PublicationPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2025-67246

登录查看更多情报信息。

Same Patch Batch · n/a · 2026-01-15 · 32 CVEs total

CVE-2025-70656Tenda AX1806 安全漏洞
CVE-2025-67822Mitel MiVoice MX-ONE 安全漏洞
CVE-2025-67823Mitel MiContact Center Business 安全漏洞
CVE-2025-67025AnyComment 安全漏洞
CVE-2025-70893PHPGurukul Cyber Cafe Management System 安全漏洞
CVE-2025-70892Phpgurukul Cyber Cafe Management System 安全漏洞
CVE-2025-70891PHPGurukul Cyber Cafe Management System 安全漏洞
CVE-2025-70890PHPGurukul Cyber Cafe Management System 安全漏洞
CVE-2025-65368SparkyFitness 安全漏洞
CVE-2025-65349Each Italy Wireless Mini Router WIRELESS-N 300M 安全漏洞
CVE-2024-48077NanoMQ 安全漏洞
CVE-2025-70303GPAC 安全漏洞
CVE-2025-70302GPAC 安全漏洞
CVE-2025-70299GPAC 安全漏洞
CVE-2025-70307GPAC 安全漏洞
CVE-2025-70305GPAC 安全漏洞
CVE-2025-70744Tenda AX1806 安全漏洞
CVE-2025-70308GPAC 安全漏洞
CVE-2025-70310GPAC 安全漏洞
CVE-2025-70298GPAC 安全漏洞

Showing top 20 of 32 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2025-67246

No comments yet


Leave a comment