Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34450: CWE-121 Stack-based Buffer Overflow in merbanan rtl_433

0
Medium
VulnerabilityCVE-2025-34450cvecve-2025-34450cwe-121
Published: Thu Dec 18 2025 (12/18/2025, 21:15:50 UTC)
Source: CVE Database V5
Vendor/Project: merbanan
Product: rtl_433

Description

merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.

AI-Powered Analysis

AILast updated: 12/25/2025, 22:18:44 UTC

Technical Analysis

CVE-2025-34450 is a stack-based buffer overflow vulnerability identified in the rtl_433 project maintained by merbanan. The vulnerability resides in the parse_rfraw() function within src/rfraw.c, where the software processes raw RF input data. Versions up to and including 25.02, prior to commit 25e47f8, do not properly validate the size of incoming RF data, allowing crafted or excessively large inputs to overflow a stack buffer. This overflow can corrupt memory, potentially causing the application to crash or behave unpredictably. While the primary impact is denial of service, under certain conditions—such as specific memory layouts and absence of exploit mitigations—an attacker might leverage this overflow for arbitrary code execution or privilege escalation. The vulnerability requires local access to the RF input stream, as indicated by the CVSS vector (Attack Vector: Local). No user interaction or privileges are required, but the attacker must supply malicious RF data. rtl_433 is widely used for decoding signals from various RF devices including weather stations, sensors, and remote controls, often in IoT and hobbyist environments. The vulnerability was published on December 18, 2025, with a CVSS 4.0 base score of 6.9, reflecting medium severity due to the local attack vector and lack of authentication requirements. No public exploits have been reported to date, but the potential for denial of service and further exploitation warrants attention.

Potential Impact

For European organizations, the primary impact of CVE-2025-34450 is the risk of denial of service in systems relying on rtl_433 for RF signal decoding. This can disrupt monitoring, automation, or data collection processes that depend on RF devices, potentially affecting operational continuity. In industrial or critical infrastructure contexts where rtl_433 is integrated into sensor networks or environmental monitoring, such disruptions could have safety or compliance implications. Although the vulnerability requires local RF input manipulation, attackers with physical proximity or access to RF transmission paths could exploit it. The possibility of further exploitation beyond denial of service, while environment-dependent, raises concerns for confidentiality and integrity if attackers achieve code execution. European organizations with IoT deployments, smart building systems, or research labs using rtl_433 should assess exposure. The medium severity rating suggests moderate risk but highlights the need for timely mitigation to prevent service interruptions and potential escalation.

Mitigation Recommendations

To mitigate CVE-2025-34450, organizations should first verify the version of rtl_433 in use and upgrade to a version including the fix beyond commit 25e47f8 once it is released. If an official patch is not yet available, consider applying source code fixes manually by reviewing the changes in the commit addressing the buffer overflow. Restrict the source of RF input data to trusted and controlled environments to reduce the risk of receiving crafted malicious signals. Employ RF signal filtering or validation mechanisms upstream to detect and block anomalous or excessively large inputs. Implement runtime protections such as stack canaries, address space layout randomization (ASLR), and control flow integrity (CFI) where possible to hinder exploitation attempts. Monitor rtl_433 application logs and system behavior for crashes or anomalies indicative of attempted exploitation. For critical deployments, consider isolating rtl_433 instances in sandboxed or containerized environments to limit the impact of potential crashes or code execution. Finally, maintain awareness of updates from the rtl_433 project and security advisories to promptly apply patches.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.602Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 694471834eb3efac36abad23

Added to database: 12/18/2025, 9:26:27 PM

Last enriched: 12/25/2025, 10:18:44 PM

Last updated: 2/6/2026, 10:10:28 AM

Views: 71

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats