Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 24 Dec 2025 12:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wb2osz
Wb2osz dire Wolf |
|
| Vendors & Products |
Wb2osz
Wb2osz dire Wolf |
Tue, 23 Dec 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | wb2osz/direwolf <= 1.8 Reachable Assertion DoS | wb2osz/direwolf <= 1.8.1 Reachable Assertion DoS |
Tue, 23 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Mon, 22 Dec 2025 22:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 22 Dec 2025 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 3658a87, contain a reachable assertion vulnerability in the APRS MIC-E decoder function aprs_mic_e() located in src/decode_aprs.c. When processing a specially crafted AX.25 frame containing a MIC-E message with an empty or truncated comment field, the application triggers an unhandled assertion checking for a non-empty comment. This assertion failure causes immediate process termination, allowing a remote, unauthenticated attacker to cause a denial of service by sending malformed APRS traffic. | |
| Title | wb2osz/direwolf <= 1.8 Reachable Assertion DoS | |
| Weaknesses | CWE-617 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-23T15:43:56.390Z
Reserved: 2025-04-15T19:15:22.603Z
Link: CVE-2025-34458
Updated: 2025-12-22T21:52:59.265Z
Status : Deferred
Published: 2025-12-22T22:16:04.687
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-34458
OpenCVE Enrichment
Updated: 2025-12-24T11:53:25Z