📦 Gecko Software Development Kit
by Silabs
🔍 What is Gecko Software Development Kit?
Description coming soon...
🛡️ Security Overview
Click on a severity to filter vulnerabilities
⚠️ Known Vulnerabilities
This critical vulnerability allows remote attackers to execute arbitrary code on systems running Weston Embedded uC-HTTP server by sending specially crafted network packets. The heap-based buffer over...
This vulnerability allows attackers to bypass TrustZone memory isolation in Silicon Labs Gecko SDK, enabling unauthorized access to trusted memory regions from untrusted areas. It affects systems usin...
A memory corruption vulnerability in Weston Embedded uC-HTTP v3.01.01's HTTP Server Host header parsing allows remote code execution via specially crafted network packets. This affects systems running...
This vulnerability allows remote attackers to execute arbitrary code on systems running Weston Embedded uC-HTTP v3.01.01 by sending specially crafted HTTP packets. It affects any device or application...
This CVE describes a heap-based buffer overflow vulnerability in Weston Embedded uC-HTTP v3.01.01's HTTP server functionality. Attackers can send specially crafted network packets to trigger arbitrary...
A buffer overflow vulnerability in the Wi-Fi Commissioning example code in Silicon Labs Gecko SDK allows attackers to write arbitrary payloads onto the stack. This affects devices using Gecko SDK v4.2...
CVE-2023-6874 is a denial of service vulnerability in Silicon Labs Ember ZNet wireless networking stack versions before 7.4.0. Attackers can manipulate NWK sequence numbers to cause network disruption...
An out-of-bounds write vulnerability in Weston Embedded uC-HTTP v3.01.01 allows remote attackers to cause memory corruption via specially crafted HTTP packets. This affects systems using the vulnerabl...
This vulnerability in Silicon Labs Gecko SDK Bluetooth LE stack allows an attacker to send a malformed 'prepare write request' command that causes memory exhaustion, leading to denial-of-service by pr...