Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 24 Dec 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wb2osz
Wb2osz dire Wolf |
|
| Vendors & Products |
Wb2osz
Wb2osz dire Wolf |
Tue, 23 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | wb2osz/direwolf <= 1.8 Stack-based Buffer Overflow DoS | wb2osz/direwolf <= 1.8.1 Stack-based Buffer Overflow DoS |
Tue, 23 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 22 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition. | |
| Title | wb2osz/direwolf <= 1.8 Stack-based Buffer Overflow DoS | |
| Weaknesses | CWE-121 | |
| References |
|
|
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T15:43:55.657Z
Reserved: 2025-04-15T19:15:22.603Z
Link: CVE-2025-34457
Updated: 2025-12-22T21:53:49.373Z
Status : Deferred
Published: 2025-12-22T22:16:04.493
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-34457
OpenCVE Enrichment
Updated: 2025-12-24T11:53:26Z