Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-66217: CWE-122: Heap-based Buffer Overflow in jvde-github AIS-catcher

0
High
VulnerabilityCVE-2025-66217cvecve-2025-66217cwe-122cwe-191
Published: Sat Nov 29 2025 (11/29/2025, 01:57:52 UTC)
Source: CVE Database V5
Vendor/Project: jvde-github
Product: AIS-catcher

Description

AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigger a massive Heap Buffer Overflow by sending a malformed MQTT packet with a manipulated Topic Length field. This leads to an immediate Denial of Service (DoS) and, when used as a library, severe Memory Corruption that can be leveraged for Remote Code Execution (RCE). This issue has been patched in version 0.64.

AI-Powered Analysis

AILast updated: 11/29/2025, 02:52:33 UTC

Technical Analysis

CVE-2025-66217 is a heap-based buffer overflow vulnerability identified in the AIS-catcher software, a multi-platform AIS (Automatic Identification System) receiver used for maritime vessel tracking and related applications. The vulnerability stems from an integer underflow in the MQTT packet parsing logic before version 0.64. Specifically, the flaw occurs when processing the Topic Length field of MQTT packets: a malformed packet with a manipulated Topic Length triggers an integer underflow, causing the software to allocate insufficient memory for the topic string. This leads to a heap buffer overflow when the topic data is copied, corrupting adjacent memory. The immediate consequence is a denial of service (DoS) due to application crash or instability. More critically, when AIS-catcher is embedded as a library within other software, this memory corruption can be exploited to achieve remote code execution (RCE), allowing attackers to execute arbitrary code remotely without any authentication or user interaction. The vulnerability is exploitable remotely over the network, as MQTT is a network protocol commonly used in IoT and maritime communication systems. The issue has been addressed and patched in AIS-catcher version 0.64. The CVSS 4.0 base score of 8.8 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges or user interaction. No public exploits have been reported yet, but the potential for severe impact warrants immediate attention from users of affected versions.

Potential Impact

For European organizations, the impact of CVE-2025-66217 can be significant, especially those involved in maritime operations, port authorities, shipping companies, and IoT infrastructure relying on AIS-catcher for vessel tracking or situational awareness. A successful exploitation can cause service outages due to DoS, disrupting critical maritime traffic monitoring and safety systems. More alarmingly, if AIS-catcher is integrated as a library in other software, attackers could gain remote code execution capabilities, potentially leading to full system compromise, data breaches, or manipulation of AIS data streams. This could affect operational integrity, safety, and regulatory compliance. The maritime sector in Europe is vital for trade and security, so disruptions or compromises could have cascading effects on supply chains and national security. Additionally, organizations using MQTT-based IoT deployments that incorporate AIS-catcher may face risks of lateral movement or persistent threats if exploited. The lack of authentication and user interaction requirements increases the likelihood of exploitation in exposed network environments.

Mitigation Recommendations

European organizations should immediately upgrade AIS-catcher to version 0.64 or later to remediate this vulnerability. For deployments where upgrading is not immediately feasible, network-level mitigations should be implemented, including strict filtering and validation of MQTT traffic to block malformed packets with suspicious Topic Length fields. Employ network segmentation to isolate AIS-catcher instances from untrusted networks and restrict MQTT access to trusted sources only. Monitor network traffic for anomalies indicative of malformed MQTT packets or unexpected crashes in AIS-catcher processes. Conduct code audits and penetration testing on software that integrates AIS-catcher as a library to identify potential exploitation vectors. Implement runtime protections such as memory corruption detection tools (e.g., ASLR, DEP, or heap protection mechanisms) on hosts running AIS-catcher. Maintain up-to-date intrusion detection/prevention systems (IDS/IPS) with signatures for MQTT protocol anomalies. Finally, establish incident response plans specifically addressing potential RCE and DoS scenarios related to this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2025-11-24T23:01:29.678Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 692a5c732a13ea799fd8c862

Added to database: 11/29/2025, 2:37:39 AM

Last enriched: 11/29/2025, 2:52:33 AM

Last updated: 11/29/2025, 12:03:14 PM

Views: 19

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats