CVE-2025-34457: CWE-121 Stack-based Buffer Overflow in wb2osz Dire Wolf
wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition.
AI Analysis
Technical Summary
CVE-2025-34457 identifies a stack-based buffer overflow vulnerability in the Dire Wolf software, a popular open-source software soundcard AX.25 packet modem/TNC and APRS encoder/decoder used primarily in amateur radio digital communications. The flaw exists in the kiss_rec_byte() function within src/kiss_frame.c, where the software processes KISS frames—a protocol used to encapsulate AX.25 frames. When a crafted KISS frame reaches the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving adequate space in the stack buffer. This results in an out-of-bounds write, corrupting adjacent stack memory. Subsequently, the call to kiss_unwrap() performs an out-of-bounds read, further exacerbating memory corruption. The corrupted stack memory can cause application crashes or undefined behavior, effectively enabling a denial-of-service (DoS) attack. The vulnerability can be triggered remotely by sending malicious KISS frames, requiring no authentication or user interaction, making exploitation straightforward. Although no known exploits are currently reported in the wild, the high CVSS 8.7 score reflects the significant risk posed by this vulnerability. The issue was resolved in versions following commit 694c954 by correcting buffer size management and ensuring sufficient space for the terminating byte. Due to the specialized nature of Dire Wolf, the impact is mostly limited to organizations and individuals relying on amateur radio digital communications or related infrastructure.
Potential Impact
For European organizations, the primary impact of CVE-2025-34457 is the potential disruption of digital amateur radio communications and related services that rely on Dire Wolf. This could affect emergency communication networks, hobbyist groups, and any critical infrastructure using AX.25 protocols for telemetry or remote monitoring. A successful exploitation leads to denial-of-service conditions by crashing the Dire Wolf application, potentially causing loss of communication capabilities. While confidentiality and integrity impacts are minimal, availability is significantly affected. Organizations involved in disaster response, scientific research, or community communication networks using Dire Wolf may experience operational interruptions. The vulnerability's remote, unauthenticated exploitability increases the risk of opportunistic attacks, especially in regions with active amateur radio communities. However, the lack of known exploits in the wild currently limits immediate widespread impact.
Mitigation Recommendations
European organizations should prioritize upgrading Dire Wolf to versions released after commit 694c954, where the buffer overflow issue is fixed. If immediate upgrading is not feasible, applying patches that ensure proper buffer allocation in kiss_rec_byte() is critical. Network-level filtering can be implemented to block malformed or suspicious KISS frames, although this may require specialized knowledge of the protocol. Monitoring Dire Wolf logs for crashes or unusual behavior can help detect attempted exploitation. Organizations should also segment networks where Dire Wolf operates to limit exposure to untrusted sources. For critical deployments, consider running Dire Wolf instances with reduced privileges and employing operating system-level protections such as stack canaries and address space layout randomization (ASLR) to mitigate exploitation impact. Regularly review and update security policies related to amateur radio digital communications infrastructure.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Poland, Sweden
CVE-2025-34457: CWE-121 Stack-based Buffer Overflow in wb2osz Dire Wolf
Description
wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition.
AI-Powered Analysis
Technical Analysis
CVE-2025-34457 identifies a stack-based buffer overflow vulnerability in the Dire Wolf software, a popular open-source software soundcard AX.25 packet modem/TNC and APRS encoder/decoder used primarily in amateur radio digital communications. The flaw exists in the kiss_rec_byte() function within src/kiss_frame.c, where the software processes KISS frames—a protocol used to encapsulate AX.25 frames. When a crafted KISS frame reaches the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving adequate space in the stack buffer. This results in an out-of-bounds write, corrupting adjacent stack memory. Subsequently, the call to kiss_unwrap() performs an out-of-bounds read, further exacerbating memory corruption. The corrupted stack memory can cause application crashes or undefined behavior, effectively enabling a denial-of-service (DoS) attack. The vulnerability can be triggered remotely by sending malicious KISS frames, requiring no authentication or user interaction, making exploitation straightforward. Although no known exploits are currently reported in the wild, the high CVSS 8.7 score reflects the significant risk posed by this vulnerability. The issue was resolved in versions following commit 694c954 by correcting buffer size management and ensuring sufficient space for the terminating byte. Due to the specialized nature of Dire Wolf, the impact is mostly limited to organizations and individuals relying on amateur radio digital communications or related infrastructure.
Potential Impact
For European organizations, the primary impact of CVE-2025-34457 is the potential disruption of digital amateur radio communications and related services that rely on Dire Wolf. This could affect emergency communication networks, hobbyist groups, and any critical infrastructure using AX.25 protocols for telemetry or remote monitoring. A successful exploitation leads to denial-of-service conditions by crashing the Dire Wolf application, potentially causing loss of communication capabilities. While confidentiality and integrity impacts are minimal, availability is significantly affected. Organizations involved in disaster response, scientific research, or community communication networks using Dire Wolf may experience operational interruptions. The vulnerability's remote, unauthenticated exploitability increases the risk of opportunistic attacks, especially in regions with active amateur radio communities. However, the lack of known exploits in the wild currently limits immediate widespread impact.
Mitigation Recommendations
European organizations should prioritize upgrading Dire Wolf to versions released after commit 694c954, where the buffer overflow issue is fixed. If immediate upgrading is not feasible, applying patches that ensure proper buffer allocation in kiss_rec_byte() is critical. Network-level filtering can be implemented to block malformed or suspicious KISS frames, although this may require specialized knowledge of the protocol. Monitoring Dire Wolf logs for crashes or unusual behavior can help detect attempted exploitation. Organizations should also segment networks where Dire Wolf operates to limit exposure to untrusted sources. For critical deployments, consider running Dire Wolf instances with reduced privileges and employing operating system-level protections such as stack canaries and address space layout randomization (ASLR) to mitigate exploitation impact. Regularly review and update security policies related to amateur radio digital communications infrastructure.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.603Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 6949bb2eedc45005c15a571c
Added to database: 12/22/2025, 9:42:06 PM
Last enriched: 12/22/2025, 9:57:13 PM
Last updated: 12/23/2025, 3:03:13 AM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-7316: CWE-1284 Improper Validation of Specified Quantity in Input in Mitsubishi Electric Corporation Mitsubishi Electric CNC M800V Series M800VW
MediumCVE-2023-52163: n/a
HighCVE-2025-66735: n/a
HighCVE-2025-68480: CWE-405: Asymmetric Resource Consumption (Amplification) in marshmallow-code marshmallow
MediumCVE-2025-68476: CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') in kedacore keda
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.