Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70085: n/a

0
Critical
VulnerabilityCVE-2025-70085cvecve-2025-70085
Published: Wed Feb 11 2026 (02/11/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. The code uses sprintf to format two filenames (Source1Filename and the string returned by FileUtil_FileStateStr) into this buffer without any length checking and without using bounded format specifiers such as %.*s. If the filename length approaches OS_MAX_PATH_LEN (commonly 64-256 bytes), the combined formatted string together with constant text can exceed 256 bytes, resulting in a stack buffer overflow. Such unsafe sprintf calls are scattered across multiple functions in file.c, including FILE_ConcatenateCmd() and ConcatenateFiles(), all of which fail to validate the output length.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/19/2026, 14:10:28 UTC

Technical Analysis

CVE-2025-70085 is a stack-based buffer overflow vulnerability identified in OpenSatKit version 2.2.1. The root cause lies in the EventErrStr buffer, which is statically allocated at 256 bytes. The vulnerable code uses the unsafe sprintf function to concatenate two filenames—Source1Filename and the string returned by FileUtil_FileStateStr—into this buffer without any bounds checking or use of safer formatting specifiers like %.*s. Since filenames can be as long as OS_MAX_PATH_LEN (commonly between 64 and 256 bytes), the combined formatted string plus constant text can exceed the 256-byte buffer size, causing a stack overflow. This unsafe pattern is present in multiple functions within file.c, such as FILE_ConcatenateCmd() and ConcatenateFiles(), all of which fail to validate the output length before writing. The overflow can overwrite the stack, potentially allowing an attacker to execute arbitrary code, crash the application, or cause denial of service. The vulnerability requires no privileges or user interaction to exploit and affects the confidentiality, integrity, and availability of affected systems. The CVSS v3.1 base score is 9.8, reflecting its critical severity. No public exploits are currently known, but the vulnerability represents a significant risk to systems running OpenSatKit 2.2.1, especially in environments where long filenames are used or attacker-controlled input can influence these filenames.

Potential Impact

The impact of CVE-2025-70085 is severe due to its potential to allow remote, unauthenticated attackers to execute arbitrary code or cause denial of service via a stack buffer overflow. Successful exploitation can lead to full compromise of affected systems, including unauthorized access to sensitive data (confidentiality breach), modification or destruction of data (integrity loss), and disruption of system operations (availability loss). Organizations relying on OpenSatKit 2.2.1, particularly in aerospace, satellite communications, and defense sectors, face heightened risk as these systems often handle critical mission data and control satellite operations. The vulnerability could be leveraged to disrupt satellite command and control software, potentially causing cascading failures or loss of control over satellite assets. Additionally, the lack of authentication or user interaction requirements increases the attack surface, making automated exploitation feasible. The absence of known exploits in the wild does not diminish the urgency, as the vulnerability is straightforward to exploit given the unsafe coding practices involved.

Mitigation Recommendations

To mitigate CVE-2025-70085, organizations should immediately upgrade OpenSatKit to a version where this vulnerability is patched once available. In the absence of an official patch, developers should audit and refactor the affected code in file.c, replacing all unsafe sprintf calls with bounded functions such as snprintf or using format specifiers that limit output length (e.g., %.*s). Implement rigorous input validation to ensure filenames do not exceed safe lengths before processing. Employ compiler-based protections such as stack canaries, Address Space Layout Randomization (ASLR), and Data Execution Prevention (DEP) to reduce exploitation risk. Additionally, conduct thorough code reviews and static analysis to identify similar unsafe string operations elsewhere in the codebase. Network-level protections, such as firewall rules and intrusion detection systems, should monitor for anomalous activity targeting OpenSatKit services. Finally, maintain robust incident response plans to quickly address any exploitation attempts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 698cc7724b57a58fa1b0b315

Added to database: 2/11/2026, 6:16:18 PM

Last enriched: 2/19/2026, 2:10:28 PM

Last updated: 3/29/2026, 1:45:43 AM

Views: 53

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses