Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7660 | hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail. |
Fri, 24 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
W1.fi
W1.fi hostapd |
|
| CPEs | cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:* | |
| Vendors & Products |
W1.fi
W1.fi hostapd |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Mar 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | hostapd: RADIUS Packet Processing Flaw in hostapd | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 12 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Mar 2025 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail. | |
| Weaknesses | CWE-826 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-03-12T13:21:59.254Z
Reserved: 2025-01-28T07:05:59.180Z
Link: CVE-2025-24912
Updated: 2025-03-12T13:21:56.027Z
Status : Analyzed
Published: 2025-03-12T05:15:37.430
Modified: 2025-10-24T18:40:03.117
Link: CVE-2025-24912
OpenCVE Enrichment
No data.
EUVD