Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h7qg-49w9-4cpx

Опубликовано: 19 дек. 2025
Источник: github
Github: Не прошло ревью
CVSS4: 6.9
CVSS3: 7.8

Описание

merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.

merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.

EPSS

Процентиль: 4%
0.00019
Низкий

6.9 Medium

CVSS4

7.8 High

CVSS3

Дефекты

CWE-121
CWE-787

Связанные уязвимости

CVSS3: 7.8
ubuntu
около 2 месяцев назад

merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.

CVSS3: 7.8
nvd
около 2 месяцев назад

merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.

CVSS3: 7.8
debian
около 2 месяцев назад

merbanan/rtl_433 versions up to and including 25.02 and prior to commi ...

EPSS

Процентиль: 4%
0.00019
Низкий

6.9 Medium

CVSS4

7.8 High

CVSS3

Дефекты

CWE-121
CWE-787