Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34450: CWE-121 Stack-based Buffer Overflow in merbanan rtl_433

0
Medium
VulnerabilityCVE-2025-34450cvecve-2025-34450cwe-121
Published: Thu Dec 18 2025 (12/18/2025, 21:15:50 UTC)
Source: CVE Database V5
Vendor/Project: merbanan
Product: rtl_433

Description

merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 14:06:32 UTC

Technical Analysis

CVE-2025-34450 is a stack-based buffer overflow vulnerability identified in the open-source software rtl_433, maintained by the merbanan project. The flaw resides in the parse_rfraw() function within the src/rfraw.c source file. When rtl_433 processes raw RF input data that is either maliciously crafted or excessively large, it can write beyond the allocated stack buffer boundaries. This memory corruption can cause the application to crash, resulting in a denial of service (DoS). Under certain conditions, such as specific execution environments or lack of memory protection mechanisms, this vulnerability could be leveraged for further exploitation, potentially allowing arbitrary code execution or privilege escalation. The vulnerability affects all versions up to and including 25.02 and prior to commit 25e47f8. The CVSS 4.0 vector indicates local attack vector (AV:L), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on availability (VA:H) with no impact on confidentiality or integrity. No patches or exploit code are currently publicly available, and no known exploits have been observed in the wild. The vulnerability is classified under CWE-121, which corresponds to stack-based buffer overflows, a common and dangerous class of memory corruption bugs. rtl_433 is widely used for decoding signals from various wireless devices such as weather stations, tire pressure monitors, and other IoT sensors, making this vulnerability relevant to environments processing RF data streams.

Potential Impact

The primary impact of CVE-2025-34450 is denial of service due to application crashes when processing malicious or oversized RF input data. This can disrupt services relying on rtl_433 for real-time RF signal decoding, such as IoT monitoring, sensor data collection, and wireless device management. In environments where rtl_433 is integrated into critical infrastructure or security monitoring systems, this could lead to loss of visibility or control. Additionally, if an attacker can reliably exploit the buffer overflow beyond causing crashes, they may achieve arbitrary code execution or privilege escalation, potentially compromising the host system. The requirement for local access limits remote exploitation but does not eliminate risk in multi-tenant or shared environments where untrusted users can supply RF data. The medium CVSS score reflects the balance between the impact on availability and the limited attack vector. Organizations worldwide using rtl_433 in embedded devices, gateways, or monitoring stations are at risk of service disruption and potential further compromise if mitigations are not applied.

Mitigation Recommendations

To mitigate CVE-2025-34450, organizations should immediately upgrade rtl_433 to versions including the fix after commit 25e47f8 or later. If an upgrade is not immediately feasible, restrict access to the rtl_433 service to trusted users and networks to prevent processing of untrusted or malicious RF input data. Implement input validation and filtering at the RF data ingestion point to detect and block abnormally large or malformed raw RF packets. Employ operating system-level protections such as stack canaries, address space layout randomization (ASLR), and non-executable stack configurations to reduce exploitation risk. Monitor rtl_433 logs and system behavior for crashes or anomalies indicative of attempted exploitation. For embedded or IoT deployments, consider isolating rtl_433 processes in containers or sandboxed environments to limit impact. Regularly review and apply security updates from the merbanan project and maintain an inventory of rtl_433 deployments to ensure timely patching.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694471834eb3efac36abad23

Added to database: 12/18/2025, 9:26:27 PM

Last enriched: 3/5/2026, 2:06:32 PM

Last updated: 3/24/2026, 12:25:04 AM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses