CVE-2025-15150: Stack-based Buffer Overflow in PX4 PX4-Autopilot
A vulnerability was found in PX4 PX4-Autopilot up to 1.16.0. Affected by this issue is the function MavlinkLogHandler::state_listing/MavlinkLogHandler::log_entry_from_id of the file src/modules/mavlink/mavlink_log_handler.cpp. The manipulation results in stack-based buffer overflow. The attack is only possible with local access. The patch is identified as 338595edd1d235efd885fd5e9f45e7f9dcf4013d. It is best practice to apply a patch to resolve this issue.
AI Analysis
Technical Summary
CVE-2025-15150 is a stack-based buffer overflow vulnerability identified in the PX4-Autopilot software, a widely used open-source flight control software for drones and unmanned vehicles. The vulnerability resides in the MavlinkLogHandler module, specifically within the functions state_listing and log_entry_from_id located in the source file src/modules/mavlink/mavlink_log_handler.cpp. These functions improperly handle input data, leading to a stack-based buffer overflow condition when processing log entries. This memory corruption flaw can be triggered by an attacker with local access to the system running PX4-Autopilot, requiring only limited privileges (PR:L) and no user interaction (UI:N). The overflow could potentially allow an attacker to execute arbitrary code or cause a denial of service by crashing the autopilot software, which could have safety implications for drone operations. The vulnerability affects all PX4-Autopilot versions from 1.0 through 1.16.0. The vendor has released a patch identified by commit 338595edd1d235efd885fd5e9f45e7f9dcf4013d to address this issue. The CVSS v4.0 base score is 4.8, reflecting a medium severity due to the local attack vector and limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date. The vulnerability underscores the risks associated with local access to embedded autopilot systems and the need for strict access controls and timely patching.
Potential Impact
For European organizations, the impact of CVE-2025-15150 primarily concerns entities operating drones or unmanned vehicles that utilize PX4-Autopilot software. A successful exploitation could lead to denial of service or potentially arbitrary code execution on the autopilot system, risking mission failure, loss of control, or safety hazards. This could affect commercial drone operators, research institutions, and defense contractors. The local access requirement limits remote exploitation but insider threats or compromised local systems could still pose risks. Disruption of drone operations could impact logistics, surveillance, agriculture, and emergency response sectors. Additionally, compromised autopilot systems could be leveraged to conduct unauthorized surveillance or sabotage. The medium severity score suggests moderate risk, but the safety-critical nature of drone control systems elevates the operational impact beyond typical IT systems. Therefore, European organizations should treat this vulnerability seriously to maintain operational integrity and safety compliance.
Mitigation Recommendations
To mitigate CVE-2025-15150, European organizations should immediately apply the official patch released by the PX4 project, identified by commit 338595edd1d235efd885fd5e9f45e7f9dcf4013d, to all affected PX4-Autopilot versions up to 1.16.0. Beyond patching, organizations should enforce strict local access controls to PX4 systems, including physical security measures and user authentication to prevent unauthorized local access. Implement role-based access control (RBAC) and limit the number of users with local system privileges. Regularly audit and monitor local system access logs for suspicious activity. Employ runtime protections such as stack canaries and address space layout randomization (ASLR) where supported by the PX4 platform. Conduct thorough testing of autopilot software updates in controlled environments before deployment. Additionally, organizations should establish incident response plans specific to drone system compromises and ensure personnel are trained to recognize and respond to anomalies in drone behavior that could indicate exploitation.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Sweden
CVE-2025-15150: Stack-based Buffer Overflow in PX4 PX4-Autopilot
Description
A vulnerability was found in PX4 PX4-Autopilot up to 1.16.0. Affected by this issue is the function MavlinkLogHandler::state_listing/MavlinkLogHandler::log_entry_from_id of the file src/modules/mavlink/mavlink_log_handler.cpp. The manipulation results in stack-based buffer overflow. The attack is only possible with local access. The patch is identified as 338595edd1d235efd885fd5e9f45e7f9dcf4013d. It is best practice to apply a patch to resolve this issue.
AI-Powered Analysis
Technical Analysis
CVE-2025-15150 is a stack-based buffer overflow vulnerability identified in the PX4-Autopilot software, a widely used open-source flight control software for drones and unmanned vehicles. The vulnerability resides in the MavlinkLogHandler module, specifically within the functions state_listing and log_entry_from_id located in the source file src/modules/mavlink/mavlink_log_handler.cpp. These functions improperly handle input data, leading to a stack-based buffer overflow condition when processing log entries. This memory corruption flaw can be triggered by an attacker with local access to the system running PX4-Autopilot, requiring only limited privileges (PR:L) and no user interaction (UI:N). The overflow could potentially allow an attacker to execute arbitrary code or cause a denial of service by crashing the autopilot software, which could have safety implications for drone operations. The vulnerability affects all PX4-Autopilot versions from 1.0 through 1.16.0. The vendor has released a patch identified by commit 338595edd1d235efd885fd5e9f45e7f9dcf4013d to address this issue. The CVSS v4.0 base score is 4.8, reflecting a medium severity due to the local attack vector and limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date. The vulnerability underscores the risks associated with local access to embedded autopilot systems and the need for strict access controls and timely patching.
Potential Impact
For European organizations, the impact of CVE-2025-15150 primarily concerns entities operating drones or unmanned vehicles that utilize PX4-Autopilot software. A successful exploitation could lead to denial of service or potentially arbitrary code execution on the autopilot system, risking mission failure, loss of control, or safety hazards. This could affect commercial drone operators, research institutions, and defense contractors. The local access requirement limits remote exploitation but insider threats or compromised local systems could still pose risks. Disruption of drone operations could impact logistics, surveillance, agriculture, and emergency response sectors. Additionally, compromised autopilot systems could be leveraged to conduct unauthorized surveillance or sabotage. The medium severity score suggests moderate risk, but the safety-critical nature of drone control systems elevates the operational impact beyond typical IT systems. Therefore, European organizations should treat this vulnerability seriously to maintain operational integrity and safety compliance.
Mitigation Recommendations
To mitigate CVE-2025-15150, European organizations should immediately apply the official patch released by the PX4 project, identified by commit 338595edd1d235efd885fd5e9f45e7f9dcf4013d, to all affected PX4-Autopilot versions up to 1.16.0. Beyond patching, organizations should enforce strict local access controls to PX4 systems, including physical security measures and user authentication to prevent unauthorized local access. Implement role-based access control (RBAC) and limit the number of users with local system privileges. Regularly audit and monitor local system access logs for suspicious activity. Employ runtime protections such as stack canaries and address space layout randomization (ASLR) where supported by the PX4 platform. Conduct thorough testing of autopilot software updates in controlled environments before deployment. Additionally, organizations should establish incident response plans specific to drone system compromises and ensure personnel are trained to recognize and respond to anomalies in drone behavior that could indicate exploitation.
Affected Countries
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2025-12-27T13:39:28.311Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 695450b9db813ff03e2bf70e
Added to database: 12/30/2025, 10:22:49 PM
Last enriched: 12/30/2025, 11:38:28 PM
Last updated: 2/2/2026, 8:56:24 AM
Views: 46
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893
HighCVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791
HighCVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791
HighCVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910
HighCVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.