Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-15150: Stack-based Buffer Overflow in PX4 PX4-Autopilot

0
Medium
VulnerabilityCVE-2025-15150cvecve-2025-15150
Published: Sun Dec 28 2025 (12/28/2025, 19:02:07 UTC)
Source: CVE Database V5
Vendor/Project: PX4
Product: PX4-Autopilot

Description

A vulnerability was found in PX4 PX4-Autopilot up to 1.16.0. Affected by this issue is the function MavlinkLogHandler::state_listing/MavlinkLogHandler::log_entry_from_id of the file src/modules/mavlink/mavlink_log_handler.cpp. The manipulation results in stack-based buffer overflow. The attack is only possible with local access. The patch is identified as 338595edd1d235efd885fd5e9f45e7f9dcf4013d. It is best practice to apply a patch to resolve this issue.

AI-Powered Analysis

AILast updated: 12/30/2025, 23:38:28 UTC

Technical Analysis

CVE-2025-15150 is a stack-based buffer overflow vulnerability identified in the PX4-Autopilot software, a widely used open-source flight control software for drones and unmanned vehicles. The vulnerability resides in the MavlinkLogHandler module, specifically within the functions state_listing and log_entry_from_id located in the source file src/modules/mavlink/mavlink_log_handler.cpp. These functions improperly handle input data, leading to a stack-based buffer overflow condition when processing log entries. This memory corruption flaw can be triggered by an attacker with local access to the system running PX4-Autopilot, requiring only limited privileges (PR:L) and no user interaction (UI:N). The overflow could potentially allow an attacker to execute arbitrary code or cause a denial of service by crashing the autopilot software, which could have safety implications for drone operations. The vulnerability affects all PX4-Autopilot versions from 1.0 through 1.16.0. The vendor has released a patch identified by commit 338595edd1d235efd885fd5e9f45e7f9dcf4013d to address this issue. The CVSS v4.0 base score is 4.8, reflecting a medium severity due to the local attack vector and limited impact on confidentiality, integrity, and availability. No known exploits have been reported in the wild as of the publication date. The vulnerability underscores the risks associated with local access to embedded autopilot systems and the need for strict access controls and timely patching.

Potential Impact

For European organizations, the impact of CVE-2025-15150 primarily concerns entities operating drones or unmanned vehicles that utilize PX4-Autopilot software. A successful exploitation could lead to denial of service or potentially arbitrary code execution on the autopilot system, risking mission failure, loss of control, or safety hazards. This could affect commercial drone operators, research institutions, and defense contractors. The local access requirement limits remote exploitation but insider threats or compromised local systems could still pose risks. Disruption of drone operations could impact logistics, surveillance, agriculture, and emergency response sectors. Additionally, compromised autopilot systems could be leveraged to conduct unauthorized surveillance or sabotage. The medium severity score suggests moderate risk, but the safety-critical nature of drone control systems elevates the operational impact beyond typical IT systems. Therefore, European organizations should treat this vulnerability seriously to maintain operational integrity and safety compliance.

Mitigation Recommendations

To mitigate CVE-2025-15150, European organizations should immediately apply the official patch released by the PX4 project, identified by commit 338595edd1d235efd885fd5e9f45e7f9dcf4013d, to all affected PX4-Autopilot versions up to 1.16.0. Beyond patching, organizations should enforce strict local access controls to PX4 systems, including physical security measures and user authentication to prevent unauthorized local access. Implement role-based access control (RBAC) and limit the number of users with local system privileges. Regularly audit and monitor local system access logs for suspicious activity. Employ runtime protections such as stack canaries and address space layout randomization (ASLR) where supported by the PX4 platform. Conduct thorough testing of autopilot software updates in controlled environments before deployment. Additionally, organizations should establish incident response plans specific to drone system compromises and ensure personnel are trained to recognize and respond to anomalies in drone behavior that could indicate exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2025-12-27T13:39:28.311Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 695450b9db813ff03e2bf70e

Added to database: 12/30/2025, 10:22:49 PM

Last enriched: 12/30/2025, 11:38:28 PM

Last updated: 2/2/2026, 8:56:24 AM

Views: 46

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-20422: CWE-617 Reachable Assertion in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8668, MT8673, MT8675, MT8676, MT8678, MT8755, MT8771, MT8775, MT8791, MT8791T, MT8792, MT8793, MT8795T, MT8797, MT8798, MT8863, MT8873, MT8883, MT8893

High
VulnerabilityMon Feb 02 2026

CVE-2026-20421: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT6833, MT6853, MT6855, MT6873, MT6875, MT6877, MT6880, MT6883, MT6885, MT6889, MT6890, MT6891, MT6893, MT8791

High
VulnerabilityMon Feb 02 2026

CVE-2026-20420: CWE-125 Out-of-bounds Read in MediaTek, Inc. MT2735, MT2737, MT6813, MT6815, MT6833, MT6835, MT6853, MT6855, MT6858, MT6873, MT6875, MT6877, MT6878, MT6879, MT6880, MT6883, MT6885, MT6886, MT6889, MT6890, MT6891, MT6893, MT6895, MT6896, MT6897, MT6899, MT6980, MT6983, MT6985, MT6986, MT6989, MT6990, MT6991, MT6993, MT8676, MT8791

High
VulnerabilityMon Feb 02 2026

CVE-2026-20419: CWE-754 Improper Check for Unusual or Exceptional Conditions in MediaTek, Inc. MT6890, MT6989TB, MT7902, MT7915, MT7916, MT7920, MT7921, MT7922, MT7925, MT7927, MT7981, MT7986, MT8196, MT8668, MT8676, MT8678, MT8775, MT8791T, MT8792, MT8793, MT8796, MT8873, MT8883, MT8893, MT8910

High
VulnerabilityMon Feb 02 2026

CVE-2026-20418: CWE-787 Out-of-bounds Write in MediaTek, Inc. MT7931, MT7933

High
VulnerabilityMon Feb 02 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats