Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 31 Dec 2025 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rtl 433 Project
Rtl 433 Project rtl 433 |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:rtl_433_project:rtl_433:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Rtl 433 Project
Rtl 433 Project rtl 433 |
|
| Metrics |
cvssV3_1
|
Thu, 18 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 18 Dec 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations. | |
| Title | merbanan/rtl_433 <= 25.02 Stack-based Buffer Overflow | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:08:48.520Z
Reserved: 2025-04-15T19:15:22.602Z
Link: CVE-2025-34450
Updated: 2025-12-18T21:38:31.511Z
Status : Analyzed
Published: 2025-12-18T22:15:56.163
Modified: 2025-12-31T17:45:03.617
Link: CVE-2025-34450
No data.
OpenCVE Enrichment
No data.