CVE-2025-34457: CWE-121 Stack-based Buffer Overflow in wb2osz Dire Wolf
wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition.
AI Analysis
Technical Summary
CVE-2025-34457 is a stack-based buffer overflow vulnerability identified in the Dire Wolf software, a popular open-source software soundcard AX.25 packet modem/TNC and APRS encoder/decoder used primarily in amateur radio communications. The vulnerability resides in the kiss_rec_byte() function within src/kiss_frame.c. When processing KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write to the stack, followed by an out-of-bounds read during the subsequent call to kiss_unwrap(). The consequence is stack memory corruption, which can cause the application to crash or behave unpredictably. The flaw can be triggered remotely by sending crafted KISS frames, requiring no authentication or user interaction, making it a network-exploitable denial-of-service vulnerability. Although no exploits are currently known in the wild, the CVSS 4.0 base score of 8.7 reflects the high impact on availability and ease of exploitation. The vulnerability affects all Dire Wolf versions up to 1.8 prior to commit 694c954. No official patches are linked yet, so users must monitor vendor updates or apply code fixes manually. The vulnerability is classified under CWE-121 (stack-based buffer overflow), a common and dangerous software weakness.
Potential Impact
The primary impact of CVE-2025-34457 is denial-of-service (DoS) through application crashes or memory corruption in Dire Wolf instances processing maliciously crafted KISS frames. This can disrupt amateur radio digital communications, APRS tracking, and related services relying on Dire Wolf, potentially affecting emergency communication channels or hobbyist networks. Since the vulnerability is remotely exploitable without authentication, attackers can cause widespread disruption with minimal effort. Confidentiality and integrity impacts are minimal as the vulnerability does not directly enable code execution or data leakage. However, the loss of availability can degrade operational capabilities for organizations and individuals dependent on Dire Wolf. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge. The vulnerability could be leveraged in targeted attacks against critical amateur radio infrastructure or during emergency events where communication reliability is vital.
Mitigation Recommendations
1. Immediately update Dire Wolf to versions including the fix for commit 694c954 or later once available. 2. If patches are not yet released, apply manual code review and fixes to the kiss_rec_byte() function to ensure sufficient buffer space is reserved before appending the terminating FEND byte. 3. Implement network-level filtering to block or rate-limit suspicious KISS frames, especially those approaching the maximum allowed frame length, to reduce exposure to crafted packets. 4. Monitor network traffic for anomalous KISS frame sizes or malformed packets indicative of exploitation attempts. 5. Deploy application-level monitoring and automated restarts to quickly recover from crashes caused by exploitation attempts. 6. Engage with the Dire Wolf developer community to track patch releases and share mitigation strategies. 7. For critical deployments, consider isolating Dire Wolf instances within segmented networks to limit attack surface. 8. Educate users and operators about the vulnerability and the importance of timely updates.
Affected Countries
United States, Germany, Japan, United Kingdom, Canada, Australia, France, Netherlands, Italy, South Korea
CVE-2025-34457: CWE-121 Stack-based Buffer Overflow in wb2osz Dire Wolf
Description
wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-34457 is a stack-based buffer overflow vulnerability identified in the Dire Wolf software, a popular open-source software soundcard AX.25 packet modem/TNC and APRS encoder/decoder used primarily in amateur radio communications. The vulnerability resides in the kiss_rec_byte() function within src/kiss_frame.c. When processing KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write to the stack, followed by an out-of-bounds read during the subsequent call to kiss_unwrap(). The consequence is stack memory corruption, which can cause the application to crash or behave unpredictably. The flaw can be triggered remotely by sending crafted KISS frames, requiring no authentication or user interaction, making it a network-exploitable denial-of-service vulnerability. Although no exploits are currently known in the wild, the CVSS 4.0 base score of 8.7 reflects the high impact on availability and ease of exploitation. The vulnerability affects all Dire Wolf versions up to 1.8 prior to commit 694c954. No official patches are linked yet, so users must monitor vendor updates or apply code fixes manually. The vulnerability is classified under CWE-121 (stack-based buffer overflow), a common and dangerous software weakness.
Potential Impact
The primary impact of CVE-2025-34457 is denial-of-service (DoS) through application crashes or memory corruption in Dire Wolf instances processing maliciously crafted KISS frames. This can disrupt amateur radio digital communications, APRS tracking, and related services relying on Dire Wolf, potentially affecting emergency communication channels or hobbyist networks. Since the vulnerability is remotely exploitable without authentication, attackers can cause widespread disruption with minimal effort. Confidentiality and integrity impacts are minimal as the vulnerability does not directly enable code execution or data leakage. However, the loss of availability can degrade operational capabilities for organizations and individuals dependent on Dire Wolf. The lack of known exploits reduces immediate risk but does not eliminate the threat, especially as proof-of-concept exploits may emerge. The vulnerability could be leveraged in targeted attacks against critical amateur radio infrastructure or during emergency events where communication reliability is vital.
Mitigation Recommendations
1. Immediately update Dire Wolf to versions including the fix for commit 694c954 or later once available. 2. If patches are not yet released, apply manual code review and fixes to the kiss_rec_byte() function to ensure sufficient buffer space is reserved before appending the terminating FEND byte. 3. Implement network-level filtering to block or rate-limit suspicious KISS frames, especially those approaching the maximum allowed frame length, to reduce exposure to crafted packets. 4. Monitor network traffic for anomalous KISS frame sizes or malformed packets indicative of exploitation attempts. 5. Deploy application-level monitoring and automated restarts to quickly recover from crashes caused by exploitation attempts. 6. Engage with the Dire Wolf developer community to track patch releases and share mitigation strategies. 7. For critical deployments, consider isolating Dire Wolf instances within segmented networks to limit attack surface. 8. Educate users and operators about the vulnerability and the importance of timely updates.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.603Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6949bb2eedc45005c15a571c
Added to database: 12/22/2025, 9:42:06 PM
Last enriched: 3/24/2026, 12:31:12 AM
Last updated: 3/25/2026, 2:53:13 AM
Views: 75
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.