merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.
Metrics
Affected Vendors & Products
References
History
Wed, 31 Dec 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rtl 433 Project
Rtl 433 Project rtl 433 |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:rtl_433_project:rtl_433:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rtl 433 Project
Rtl 433 Project rtl 433 |
|
| Metrics |
cvssV3_1
|
Thu, 18 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations. | |
| Title | merbanan/rtl_433 <= 25.02 Stack-based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-12-18T21:15:50.730Z
Updated: 2025-12-20T13:34:31.358Z
Reserved: 2025-04-15T19:15:22.602Z
Link: CVE-2025-34450
Updated: 2025-12-18T21:38:31.511Z
Status : Analyzed
Published: 2025-12-18T22:15:56.163
Modified: 2025-12-31T17:45:03.617
Link: CVE-2025-34450
No data.