Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34450: CWE-121 Stack-based Buffer Overflow in merbanan rtl_433

0
Medium
VulnerabilityCVE-2025-34450cvecve-2025-34450cwe-121
Published: Thu Dec 18 2025 (12/18/2025, 21:15:50 UTC)
Source: CVE Database V5
Vendor/Project: merbanan
Product: rtl_433

Description

merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.

AI-Powered Analysis

AILast updated: 12/18/2025, 21:42:09 UTC

Technical Analysis

CVE-2025-34450 is a stack-based buffer overflow vulnerability identified in the rtl_433 software maintained by merbanan. The vulnerability resides in the parse_rfraw() function within src/rfraw.c, where the application processes raw radio frequency (RF) input data. Versions up to and including 25.02 and prior to commit 25e47f8 are affected. When rtl_433 processes crafted or excessively large raw RF input, it may write beyond the bounds of a stack-allocated buffer, resulting in memory corruption or a crash. This type of vulnerability is classified under CWE-121, indicating a classic stack-based buffer overflow. The overflow can cause denial of service by crashing the application, and under certain conditions—depending on the execution environment, compiler protections (such as stack canaries, ASLR), and privilege levels—may be leveraged for further exploitation, potentially allowing arbitrary code execution. The CVSS 4.0 vector indicates a local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and no impact on confidentiality, integrity, or availability directly, but with high impact on availability (VA:H). No known exploits are currently reported in the wild, but the vulnerability is public and patched in versions after commit 25e47f8. rtl_433 is commonly used for decoding signals from various RF devices including weather stations, sensors, and IoT devices, often in hobbyist, research, and industrial telemetry contexts. The vulnerability's exploitation requires the attacker to supply malicious raw RF data that rtl_433 processes, which may require physical proximity or control over RF input sources.

Potential Impact

For European organizations, the primary impact of CVE-2025-34450 is the potential for denial of service on systems running vulnerable rtl_433 versions, which could disrupt telemetry, sensor data collection, or IoT device monitoring. In environments where rtl_433 is integrated into critical infrastructure monitoring or industrial control systems, such disruptions could have operational consequences. Furthermore, if the environment lacks modern exploit mitigations, there is a risk that the vulnerability could be escalated to remote code execution, leading to broader compromise. Given rtl_433’s use in research, hobbyist, and niche industrial applications, the scale of impact is limited but non-negligible. Organizations relying on rtl_433 for RF signal decoding should consider the risk of attackers injecting crafted RF signals to trigger the overflow. The vulnerability does not affect confidentiality or integrity directly but impacts availability and potentially system integrity if exploited further. The lack of known exploits reduces immediate risk but does not eliminate it, especially as the vulnerability is publicly disclosed.

Mitigation Recommendations

1. Upgrade rtl_433 to a version that includes the fix after commit 25e47f8 or later than version 25.02. 2. Restrict sources of raw RF input data to trusted and controlled environments to prevent injection of maliciously crafted signals. 3. Employ runtime protections such as stack canaries, ASLR, and DEP on systems running rtl_433 to reduce exploitability. 4. Monitor rtl_433 application logs and system behavior for crashes or anomalies indicative of exploitation attempts. 5. If rtl_433 is used in critical environments, consider isolating the decoding process within sandboxed or containerized environments to limit impact of potential compromise. 6. Conduct regular security assessments of RF input channels and physical security to prevent unauthorized RF signal injection. 7. Engage with rtl_433 community or vendor channels for updates and patches promptly. 8. Implement network segmentation and strict access controls around systems processing RF data to limit lateral movement if exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694471834eb3efac36abad23

Added to database: 12/18/2025, 9:26:27 PM

Last enriched: 12/18/2025, 9:42:09 PM

Last updated: 12/19/2025, 5:30:37 AM

Views: 13

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats