{"uuid": "ef7d6776-a83c-466e-bc28-f8ec1a85908b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-37990", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/17026", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-37990\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In the Linux kernel, the following vulnerability has been resolved:\n\nwifi: brcm80211: fmac: Add error handling for brcmf_usb_dl_writeimage()\n\nThe function brcmf_usb_dl_writeimage() calls the function\nbrcmf_usb_dl_cmd() but dose not check its return value. The\n'state.state' and the 'state.bytes' are uninitialized if the\nfunction brcmf_usb_dl_cmd() fails. It is dangerous to use\nuninitialized variables in the conditions.\n\nAdd error handling for brcmf_usb_dl_cmd() to jump to error\nhandling path if the brcmf_usb_dl_cmd() fails and the\n'state.state' and the 'state.bytes' are uninitialized.\n\nImprove the error message to report more detailed error\ninformation.\n\ud83d\udccf Published: 2025-05-20T17:18:45.366Z\n\ud83d\udccf Modified: 2025-05-20T17:18:45.366Z\n\ud83d\udd17 References:\n1. https://git.kernel.org/stable/c/508be7c001437bacad7b9a43f08a723887bcd1ea\n2. https://git.kernel.org/stable/c/524b70441baba453b193c418e3142bd31059cc1f\n3. https://git.kernel.org/stable/c/08424a0922fb9e32a19b09d852ee87fb6c497538\n4. https://git.kernel.org/stable/c/bdb435ef9815b1ae28eefffa01c6959d0fcf1fa7\n5. https://git.kernel.org/stable/c/fa9b9f02212574ee1867fbefb0a675362a71b31d\n6. https://git.kernel.org/stable/c/8e089e7b585d95122c8122d732d1d5ef8f879396", "creation_timestamp": "2025-05-20T17:44:31.000000Z"}