Unrated severityOSV Advisory· Published Dec 18, 2025· Updated Mar 23, 2026
merbanan/rtl_433 <= 25.02 Stack-based Buffer Overflow
CVE-2025-34450
Description
merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.
Affected products
2Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- github.com/dd32/rtl_433/commit/25e47f8mitrepatch
- github.com/marlinkcyber/advisories/blob/main/advisories/MCSAID-2025-004-rtl_433-rfraw-parse-overflow.mdmitretechnical-descriptionexploit
- www.vulncheck.com/advisories/merbanan-rtl-433-stack-based-buffer-overflowmitrethird-party-advisory
- github.com/merbanan/rtl_433/issues/3375mitreissue-tracking
News mentions
0No linked articles in our index yet.