CVE-2025-34450
Severity CVSS v4.0:
MEDIUM
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
18/12/2025
Last modified:
19/12/2025
Description
merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.
Impact
Base Score 4.0
6.90
Severity 4.0
MEDIUM
References to Advisories, Solutions, and Tools
- https://github.com/dd32/rtl_433/commit/25e47f8
- https://github.com/marlinkcyber/advisories/blob/main/advisories/MCSAID-2025-004-rtl_433-rfraw-parse-overflow.md
- https://github.com/merbanan/rtl_433/issues/3375
- https://www.vulncheck.com/advisories/merbanan-rtl-433-stack-based-buffer-overflow
- https://github.com/marlinkcyber/advisories/blob/main/advisories/MCSAID-2025-004-rtl_433-rfraw-parse-overflow.md



