tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802.11 management frame elements and performs a length check on the wrong field when handling the TIM element. A crafted frame with a large TIM length can cause a 1-byte out-of-bounds write past `tim.bitmap[251]`. The overflow is small and DoS is the likely impact; code execution is potential, but still up in the air. The affected structure is stack-allocated in `handle_beacon()` and related handlers. As of time of publication, no known patches are available.
History

Fri, 30 Jan 2026 09:00:00 +0000

Type Values Removed Values Added
First Time appeared Simsong
Simsong tcpflow
Vendors & Products Simsong
Simsong tcpflow

Thu, 29 Jan 2026 22:00:00 +0000

Type Values Removed Values Added
Description tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802.11 management frame elements and performs a length check on the wrong field when handling the TIM element. A crafted frame with a large TIM length can cause a 1-byte out-of-bounds write past `tim.bitmap[251]`. The overflow is small and DoS is the likely impact; code execution is potential, but still up in the air. The affected structure is stack-allocated in `handle_beacon()` and related handlers. As of time of publication, no known patches are available.
Title tcpflow has TIM Element OOB Write in wifipcap
Weaknesses CWE-787
References
Metrics cvssV4_0

{'score': 5.5, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2026-01-29T21:42:47.013Z

Updated: 2026-01-29T21:42:47.013Z

Reserved: 2026-01-28T14:50:47.889Z

Link: CVE-2026-25061

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-01-29T22:15:55.797

Modified: 2026-01-29T22:15:55.797

Link: CVE-2026-25061

cve-icon Redhat

No data.