Unrated severityNVD Advisory· Published Nov 29, 2025· Updated Dec 1, 2025
AIS-catcher Integer Underflow in MQTT Packet Parsing leading to Heap Buffer Overflow
CVE-2025-66217
Description
AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigger a massive Heap Buffer Overflow by sending a malformed MQTT packet with a manipulated Topic Length field. This leads to an immediate Denial of Service (DoS) and, when used as a library, severe Memory Corruption that can be leveraged for Remote Code Execution (RCE). This issue has been patched in version 0.64.
Affected products
2- Range: <0.64
- jvde-github/AIS-catcherv5Range: < 0.64
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/jvde-github/AIS-catcher/commit/e0f7242eee659909adc11a4c561c3f7011bdefe7mitrex_refsource_MISC
- github.com/jvde-github/AIS-catcher/security/advisories/GHSA-93mj-c8q3-69rgmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.