Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-34458: CWE-617 Reachable Assertion in wb2osz Dire Wolf

0
High
VulnerabilityCVE-2025-34458cvecve-2025-34458cwe-617
Published: Mon Dec 22 2025 (12/22/2025, 21:29:46 UTC)
Source: CVE Database V5
Vendor/Project: wb2osz
Product: Dire Wolf

Description

CVE-2025-34458 is a high-severity reachable assertion vulnerability in Dire Wolf versions up to 1. 8, affecting the APRS MIC-E decoder function. A remote, unauthenticated attacker can send specially crafted AX. 25 frames with malformed MIC-E messages containing empty or truncated comment fields, triggering an assertion failure that causes the application to terminate immediately. This results in a denial of service (DoS) condition. The vulnerability requires no authentication or user interaction and can be exploited over the network. No known exploits are currently reported in the wild. The flaw stems from improper handling of input validation in the aprs_mic_e() function, violating the assumption that the comment field is always non-empty. Organizations relying on Dire Wolf for APRS decoding should apply patches or implement input validation workarounds to mitigate this risk. The vulnerability has a CVSS 4.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:31:24 UTC

Technical Analysis

CVE-2025-34458 is a reachable assertion vulnerability identified in the open-source APRS decoder software Dire Wolf, specifically in versions up to and including 1.8 prior to commit 3658a87. The vulnerability resides in the aprs_mic_e() function within src/decode_aprs.c, which processes MIC-E encoded messages in AX.25 frames used by APRS (Automatic Packet Reporting System). The function contains an assertion that expects the comment field of a MIC-E message to be non-empty. However, when the software receives a specially crafted AX.25 frame with a MIC-E message that has an empty or truncated comment field, this assertion fails. Because the assertion failure is unhandled, it causes the process to terminate immediately, resulting in a denial of service. This flaw can be exploited remotely by an unauthenticated attacker simply by sending malformed APRS traffic to a system running the vulnerable Dire Wolf version. The vulnerability does not require any user interaction or privileges, making it highly accessible for exploitation. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and a high impact on availability (VA:H) with no impact on confidentiality or integrity. No patches or fixes are linked in the provided data, but the vulnerability is addressed in commits after 3658a87. No known exploits have been reported in the wild yet. The root cause is insufficient input validation and improper handling of edge cases in the MIC-E decoder logic, violating the assumption that the comment field is always present and non-empty.

Potential Impact

The primary impact of CVE-2025-34458 is a denial of service condition caused by the abrupt termination of the Dire Wolf process upon receiving malformed APRS MIC-E messages. This can disrupt APRS decoding services, which are critical for amateur radio operators, emergency communication networks, and other telemetry or location reporting systems relying on APRS infrastructure. Organizations using Dire Wolf for real-time APRS data processing may experience service outages, loss of situational awareness, and interruption of communication channels. Since the vulnerability can be triggered remotely without authentication, attackers can easily exploit it to degrade or disable APRS services. This could have cascading effects on emergency response coordination and public safety communications in regions dependent on APRS. The vulnerability does not directly compromise confidentiality or integrity but severely impacts availability. Given the niche usage of Dire Wolf primarily in amateur radio and related communities, the overall global impact is moderate but critical within affected sectors.

Mitigation Recommendations

To mitigate CVE-2025-34458, organizations should immediately upgrade Dire Wolf to versions including or following commit 3658a87 where the assertion vulnerability is fixed. If upgrading is not immediately feasible, implement input validation filters at the network boundary to detect and block malformed AX.25 frames with empty or truncated MIC-E comment fields. Monitoring APRS traffic for anomalous or malformed packets can help identify exploitation attempts. Consider running Dire Wolf within containerized or sandboxed environments to limit the impact of process crashes. Additionally, patch management processes should be enhanced to track Dire Wolf updates and apply security fixes promptly. Developers maintaining forks or custom builds of Dire Wolf should review and harden the aprs_mic_e() function to handle edge cases gracefully without relying on assertions that terminate the process. Finally, raising awareness in amateur radio and emergency communication communities about this vulnerability will help coordinate defensive measures.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2025-04-15T19:15:22.603Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 6949bb2eedc45005c15a5722

Added to database: 12/22/2025, 9:42:06 PM

Last enriched: 3/24/2026, 12:31:24 AM

Last updated: 3/24/2026, 2:31:02 PM

Views: 72

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses