一、 漏洞 CVE-2025-6093 基础信息
漏洞信息
                                        神龙正在分析中.
                                        
提示
尽管我们采用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。
神龙会尽力确保数据准确,但也请结合实际情况进行甄别与判断。
神龙祝您一切顺利!
漏洞标题
uYanki board-stm32f103rc-berial heartrate1_hal.c heartrate1_i2c_hal_write stack-based overflow
来源:美国国家漏洞数据库 NVD
漏洞描述信息
A vulnerability classified as critical was found in uYanki board-stm32f103rc-berial up to 84daed541609cb7b46854cc6672a275d1007e295. This vulnerability affects the function heartrate1_i2c_hal_write of the file 7.Example/hal/i2c/max30100/Manual/demo2/2/heartrate1_hal.c. The manipulation of the argument num leads to stack-based buffer overflow. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available.
来源:美国国家漏洞数据库 NVD
CVSS信息
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
来源:美国国家漏洞数据库 NVD
漏洞类别
栈缓冲区溢出
来源:美国国家漏洞数据库 NVD
二、漏洞 CVE-2025-6093 的公开POC
# POC 描述 源链接 神龙链接
三、漏洞 CVE-2025-6093 的情报信息
  • 标题: Stack-based Buffer Overflow in heartrate1_i2c_hal_write() Function · Issue #3 · uYanki/board-stm32f103rc-berial -- 🔗来源链接

    标签: issue-tracking

    神龙速读
  • 标题: Login required -- 🔗来源链接

    标签: signature permissions-required

    神龙速读
  • 标题: Submit #588106: uYanki board-stm32f103rc-berial 0.0 Buffer Overflow -- 🔗来源链接

    标签: third-party-advisory

    神龙速读
  • 标题: CVE-2025-6093 uYanki board-stm32f103rc-berial heartrate1_hal.c heartrate1_i2c_hal_write stack-based overflow (EUVD-2025-18353) -- 🔗来源链接

    标签: vdb-entry technical-description

    神龙速读
  • https://nvd.nist.gov/vuln/detail/CVE-2025-6093