CVE-2025-70616

A stack buffer overflow vulnerability exists in the Wincor Nixdorf wnBios64.sys kernel driver (version 1.2.0.0) in the IOCTL handler for code 0x80102058. The vulnerability is caused by missing bounds checking on the user-controlled Options parameter before copying data into a 40-byte stack buffer (Src[40]) using memmove. An attacker with local access can exploit this vulnerability by sending a crafted IOCTL request with Options > 40, causing a stack buffer overflow that may lead to kernel code execution, local privilege escalation, or denial of service (system crash). Additionally, the same IOCTL handler can leak kernel addresses and other sensitive stack data when reading beyond the buffer boundaries.
References
Link Resource
https://github.com/250wuyifan/wnBios64-CVE Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:dieboldnixdorf:wnbios64.sys:1.2.0.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-05 19:16

Updated : 2026-03-10 19:41


NVD link : CVE-2025-70616

Mitre link : CVE-2025-70616

CVE.ORG link : CVE-2025-70616


JSON object : View

Products Affected

dieboldnixdorf

  • wnbios64.sys
CWE
CWE-121

Stack-based Buffer Overflow