Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-62672: CWE-770 Allocation of Resources Without Limits or Throttling in boyns rplay

0
Medium
VulnerabilityCVE-2025-62672cvecve-2025-62672cwe-770
Published: Sun Oct 19 2025 (10/19/2025, 00:00:00 UTC)
Source: CVE Database V5
Vendor/Project: boyns
Product: rplay

Description

rplay through 3.3.2 allows attackers to cause a denial of service (SIGSEGV and daemon crash) or possibly have unspecified other impact. This occurs in memcpy in the RPLAY_DATA case in rplay_unpack in librplay/rplay.c, potentially reachable via packet data with no authentication.

AI-Powered Analysis

AILast updated: 10/27/2025, 01:24:14 UTC

Technical Analysis

CVE-2025-62672 is a vulnerability identified in the boyns rplay software, specifically affecting versions up to 3.3.2. The root cause is an allocation of resources without proper limits or throttling (CWE-770) in the rplay_unpack function located in librplay/rplay.c. The vulnerability manifests during the processing of packet data in the RPLAY_DATA case, where a memcpy operation can be exploited by specially crafted packets. This leads to a segmentation fault (SIGSEGV) and subsequent daemon crash, resulting in a denial of service (DoS) condition. The flaw is exploitable remotely without authentication or user interaction, as the vulnerable code processes incoming packet data directly. The CVSS v3.1 base score is 5.3, reflecting a medium severity level, with attack vector network (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and impact limited to availability (A:L) without affecting confidentiality or integrity. No patches or known exploits have been reported at the time of publication, but the vulnerability poses a risk to service availability in environments where rplay is deployed. The lack of throttling or resource limits can potentially be leveraged to cause repeated crashes or resource exhaustion, impacting system stability and uptime.

Potential Impact

For European organizations, the primary impact of CVE-2025-62672 is denial of service, which can disrupt critical network services or applications relying on boyns rplay. This may affect operational continuity, especially in sectors such as telecommunications, industrial control systems, or any infrastructure using rplay for data replay or network functions. While confidentiality and integrity are not directly compromised, the availability impact can lead to downtime, loss of productivity, and potential cascading failures in dependent systems. Organizations with high availability requirements or those operating in regulated industries may face compliance and reputational risks if service disruptions occur. The unauthenticated nature of the exploit increases the threat level, as attackers can trigger the vulnerability remotely without needing credentials or user interaction. Although no active exploitation is reported, the medium severity rating and ease of exploitation warrant proactive mitigation to prevent potential attacks.

Mitigation Recommendations

To mitigate CVE-2025-62672, European organizations should first verify if they are running affected versions of boyns rplay (up to 3.3.2). Since no official patches are currently available, organizations should implement network-level controls to restrict or monitor incoming traffic to the rplay service, such as firewall rules or intrusion prevention systems that can detect and block malformed packets targeting the RPLAY_DATA case. Rate limiting and traffic shaping can help prevent resource exhaustion by limiting the number of packets processed per time unit. Additionally, isolating rplay services in segmented network zones reduces exposure. Organizations should also monitor logs and daemon health to detect repeated crashes or anomalies indicative of exploitation attempts. Engaging with the vendor for updates or patches and applying them promptly once available is critical. Finally, conducting regular vulnerability assessments and penetration testing focused on rplay can help identify and remediate weaknesses before exploitation occurs.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
mitre
Date Reserved
2025-10-19T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 68f43dd577122960c164e2fc

Added to database: 10/19/2025, 1:24:37 AM

Last enriched: 10/27/2025, 1:24:14 AM

Last updated: 12/4/2025, 11:04:27 AM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats