Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-57156: n/a

0
Medium
VulnerabilityCVE-2025-57156cvecve-2025-57156
Published: Tue Jan 20 2026 (01/20/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

CVE-2025-57156 is a vulnerability in the owntone-server software where a NULL pointer dereference occurs in the dacp_reply_playqueueedit_clear function, leading to a denial of service (DoS) via a remote crash. This flaw exists in the HTTP daemon component handling DACP (Digital Audio Control Protocol) requests, specifically after commit 6d604a1 post version 28. 12. Exploitation requires sending crafted requests to the affected service, causing it to crash and disrupt availability. No known exploits are currently in the wild, and no CVSS score has been assigned. European organizations using owntone-server for media streaming or audio control could face service interruptions. Mitigation involves applying patches once available or disabling vulnerable DACP functionality. Countries with higher adoption of owntone-server or similar media server deployments, such as Germany, France, and the UK, are more likely to be impacted. The severity is assessed as medium due to the DoS impact, ease of remote exploitation without authentication, but limited to availability disruption without data compromise.

AI-Powered Analysis

AILast updated: 01/20/2026, 21:36:13 UTC

Technical Analysis

CVE-2025-57156 identifies a NULL pointer dereference vulnerability in the owntone-server project, specifically within the dacp_reply_playqueueedit_clear function located in src/httpd_dacp.c. This function is part of the HTTP daemon handling DACP requests, which are used for remote control of audio playback queues. The vulnerability was introduced after version 28.12, notably in commit 6d604a1. When a specially crafted DACP request is sent to the server, the function attempts to access or clear a pointer that is NULL, causing the server process to crash. This results in a denial of service condition, rendering the media server unavailable until restarted. The flaw can be triggered remotely without authentication or user interaction, making it accessible to unauthenticated attackers on the network. While no public exploits are currently known, the vulnerability poses a risk to availability for deployments relying on owntone-server for media streaming or audio control. The lack of a CVSS score indicates the need for an independent severity assessment. The vulnerability does not appear to allow code execution or data leakage, focusing impact on service disruption. The technical root cause is improper handling of null pointers in DACP request processing, a common programming error in C-based network services.

Potential Impact

For European organizations, the primary impact of CVE-2025-57156 is the potential for denial of service against owntone-server instances. This can disrupt media streaming services, audio playback control, or other dependent applications, leading to operational downtime and user dissatisfaction. Organizations using owntone-server in corporate, educational, or entertainment environments may experience interruptions in audio services, affecting productivity or customer experience. Although no data breach or integrity compromise is indicated, repeated or targeted exploitation could degrade service reliability. The vulnerability’s remote and unauthenticated nature increases risk, especially in environments where owntone-server is exposed to untrusted networks. Given the growing use of media servers in smart office and IoT contexts, this DoS could indirectly impact broader operational technology. However, the impact is limited to availability and does not extend to confidentiality or integrity of data. The absence of known exploits reduces immediate risk but does not eliminate the threat of future weaponization.

Mitigation Recommendations

To mitigate CVE-2025-57156, European organizations should first identify all owntone-server deployments within their infrastructure. Immediate steps include restricting network access to the DACP service, ideally isolating it behind firewalls or VPNs to limit exposure to untrusted networks. Administrators should monitor for unusual crashes or service interruptions indicative of exploitation attempts. Since no official patch or update is currently linked, organizations should track the owntone-server project for forthcoming security updates addressing this issue and apply them promptly. As a temporary workaround, disabling or restricting the DACP functionality within owntone-server can prevent exploitation of the vulnerable code path. Additionally, implementing robust service monitoring and automated restart mechanisms can reduce downtime impact. Network intrusion detection systems (NIDS) can be tuned to detect anomalous DACP traffic patterns. Finally, organizations should incorporate this vulnerability into their incident response plans to quickly address potential DoS events.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-08-17T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696ff1b84623b1157c506753

Added to database: 1/20/2026, 9:20:56 PM

Last enriched: 1/20/2026, 9:36:13 PM

Last updated: 1/21/2026, 12:10:07 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Related Threats

CVE-2026-0933: CWE-20 Improper Input Validation in Cloudflare Wrangler

High
VulnerabilityTue Jan 20 2026

CVE-2026-0672: CWE-93 in Python Software Foundation CPython

Medium
VulnerabilityTue Jan 20 2026

CVE-2026-21990: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

CVE-2026-21989: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in unauthorized creation, deletion or modification access to critical data or all Oracle VM VirtualBox accessible data as well as unauthorized access to critical data or complete access to all Oracle VM VirtualBox accessible data and unauthorized ability to cause a partial denial of service (partial DOS) of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

CVE-2026-21988: Easily exploitable vulnerability allows high privileged attacker with logon to the infrastructure where Oracle VM VirtualBox executes to compromise Oracle VM VirtualBox. While the vulnerability is in Oracle VM VirtualBox, attacks may significantly impact additional products (scope change). Successful attacks of this vulnerability can result in takeover of Oracle VM VirtualBox. in Oracle Corporation Oracle VM VirtualBox

High
VulnerabilityTue Jan 20 2026

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats