Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-70309: n/a

0
Medium
VulnerabilityCVE-2025-70309cvecve-2025-70309
Published: Thu Jan 15 2026 (01/15/2026, 00:00:00 UTC)
Source: CVE Database V5

Description

A stack overflow in the pcmreframe_flush_packet function of GPAC v2.4.0 allows attackers to cause a Denial of Service (DoS) via a crafted WAV file.

AI-Powered Analysis

AILast updated: 01/15/2026, 16:33:18 UTC

Technical Analysis

The vulnerability identified as CVE-2025-70309 affects GPAC version 2.4.0, specifically within the pcmreframe_flush_packet function. GPAC is an open-source multimedia framework widely used for media processing, packaging, and streaming. The flaw is a stack overflow, a type of memory corruption vulnerability where excessive data overwrites the stack memory, potentially leading to application crashes or arbitrary code execution. In this case, the vulnerability can be triggered by feeding a crafted WAV audio file to the vulnerable function. The stack overflow results in a Denial of Service (DoS) by crashing the application or causing undefined behavior. Although no public exploits have been reported, the nature of the vulnerability suggests that an attacker can cause service disruption without requiring authentication, simply by convincing a user or system to process a malicious WAV file. The lack of a CVSS score indicates this is a newly disclosed issue, and no patches or mitigations have been officially published yet. The vulnerability impacts any software or device using GPAC v2.4.0 for audio processing, including media players, streaming servers, or embedded devices that handle WAV files. The attack vector is local or remote depending on how the WAV files are ingested, such as through file uploads, streaming, or network shares. Given the widespread use of GPAC in multimedia applications, this vulnerability poses a significant risk to availability and stability of affected systems.

Potential Impact

For European organizations, the primary impact is the risk of Denial of Service in media processing applications that rely on GPAC v2.4.0. This could disrupt services such as streaming platforms, media editing tools, or embedded systems in consumer electronics and industrial devices. Organizations in sectors like broadcasting, telecommunications, media production, and IoT device manufacturers are particularly at risk. Disruption of media services can lead to operational downtime, loss of customer trust, and potential financial losses. In critical infrastructure or industrial environments where GPAC is embedded, the DoS could affect system reliability and safety. The vulnerability does not appear to allow code execution or data theft, so confidentiality and integrity impacts are limited. However, the ease of triggering the DoS via crafted WAV files means attackers could exploit this vulnerability remotely if the media ingestion pipeline is exposed. European organizations with public-facing media services or automated media processing workflows should consider this a significant availability risk.

Mitigation Recommendations

Since no official patches or updates are currently available, organizations should implement immediate mitigations to reduce exposure. These include: 1) Restricting or sanitizing WAV file inputs to GPAC-based applications, including validating file integrity and format before processing. 2) Employing network-level controls to limit exposure of media processing services to untrusted sources. 3) Monitoring and logging media ingestion activities to detect anomalous or malformed WAV files. 4) Isolating GPAC processing components in sandboxed or containerized environments to contain potential crashes. 5) Updating to newer GPAC versions once patches addressing this vulnerability are released. 6) Reviewing and hardening media processing workflows to minimize automated processing of untrusted media files. 7) Engaging with GPAC maintainers or vendors for timely security updates and advisories. These targeted mitigations go beyond generic advice by focusing on input validation, isolation, and monitoring specific to the WAV file processing context.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2026-01-09T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 696913454c611209ad3d9fa8

Added to database: 1/15/2026, 4:18:13 PM

Last enriched: 1/15/2026, 4:33:18 PM

Last updated: 1/15/2026, 5:55:27 PM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats