Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-25061: CWE-787: Out-of-bounds Write in simsong tcpflow

0
Medium
VulnerabilityCVE-2026-25061cvecve-2026-25061cwe-787
Published: Thu Jan 29 2026 (01/29/2026, 21:42:47 UTC)
Source: CVE Database V5
Vendor/Project: simsong
Product: tcpflow

Description

tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802.11 management frame elements and performs a length check on the wrong field when handling the TIM element. A crafted frame with a large TIM length can cause a 1-byte out-of-bounds write past `tim.bitmap[251]`. The overflow is small and DoS is the likely impact; code execution is potential, but still up in the air. The affected structure is stack-allocated in `handle_beacon()` and related handlers. As of time of publication, no known patches are available.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/14/2026, 11:52:09 UTC

Technical Analysis

CVE-2026-25061 is an out-of-bounds write vulnerability classified under CWE-787 found in the tcpflow tool developed by simsong, specifically in versions up to and including 1.61. Tcpflow is a TCP/IP packet demultiplexer used for capturing and analyzing network traffic. The vulnerability exists in the wifipcap component that parses 802.11 wireless management frames. When handling the TIM (Traffic Indication Map) element, tcpflow performs a length check on an incorrect field, allowing a crafted 802.11 management frame with an excessively large TIM length to cause a 1-byte out-of-bounds write beyond the allocated buffer tim.bitmap[251]. This buffer is stack-allocated within the handle_beacon() function and related handlers. The overflow is small, limiting the immediate impact primarily to denial of service conditions such as crashes or memory corruption. However, the possibility of code execution cannot be ruled out, though no proof-of-concept exploits or active exploitation have been reported. The vulnerability can be triggered remotely without authentication or user interaction by sending malicious wireless frames. As of the publication date, no patches or fixes have been released, leaving systems vulnerable. The CVSS 4.0 base score is 5.5 (medium severity), reflecting the network attack vector, low complexity, no privileges or user interaction required, and limited impact on confidentiality and integrity but some impact on availability.

Potential Impact

For European organizations, the primary impact of CVE-2026-25061 is the potential for denial of service on systems running vulnerable tcpflow versions, which could disrupt network traffic analysis and monitoring activities. This may affect incident response teams, network security monitoring, and forensic investigations relying on tcpflow data. Although code execution is not confirmed, if exploited, it could lead to further compromise of monitoring infrastructure, potentially allowing attackers to manipulate captured data or gain footholds in internal networks. Organizations involved in wireless network management, telecom operators, research institutions, and critical infrastructure sectors that utilize tcpflow for packet analysis are at higher risk. Disruptions could impact operational continuity and security visibility. The lack of available patches increases exposure duration, necessitating immediate mitigation efforts. Additionally, attackers could leverage this vulnerability to evade detection by causing tcpflow to crash or behave unpredictably.

Mitigation Recommendations

Since no official patches are available, European organizations should implement the following specific mitigations: 1) Limit tcpflow exposure by restricting access to trusted wireless networks and filtering out untrusted or suspicious 802.11 management frames at network boundaries or wireless access points. 2) Deploy network intrusion detection systems (NIDS) capable of detecting anomalous or malformed 802.11 management frames indicative of exploitation attempts. 3) Run tcpflow with the least privileges possible and consider isolating it within containerized or sandboxed environments to reduce impact of potential crashes or exploitation. 4) Monitor tcpflow logs and system stability closely for signs of crashes or unusual behavior. 5) Engage with the tcpflow community or vendor to track patch releases and apply updates promptly once available. 6) As a temporary workaround, consider disabling wireless frame parsing features if feasible or replacing tcpflow with alternative tools not affected by this vulnerability. 7) Conduct regular security assessments of wireless infrastructure to identify and mitigate other potential attack vectors.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-01-28T14:50:47.889Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 697bd7ddac06320222bd31b3

Added to database: 1/29/2026, 9:57:49 PM

Last enriched: 2/14/2026, 11:52:09 AM

Last updated: 3/26/2026, 4:13:23 AM

Views: 55

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses