CVE-2025-1788

MEDIUM

rizinorg rizin <0.8.0 - Buffer Overflow

Title source: llm
STIX 2.1

Description

A vulnerability, which was classified as critical, was found in rizinorg rizin up to 0.8.0. This affects the function rz_utf8_encode in the library /librz/util/utf8.c. The manipulation leads to heap-based buffer overflow. An attack has to be approached locally. The exploit has been disclosed to the public and may be used. It is recommended to apply a patch to fix this issue.

References (7)

Core 7
Core References
Third Party Advisory, VDB Entry vdb-entry technical-description
https://vuldb.com/?id.298011
Permissions Required, VDB Entry signature permissions-required
https://vuldb.com/?ctiid.298011
Exploit, Third Party Advisory, VDB Entry third-party-advisory
https://vuldb.com/?submit.502345
Exploit, Issue Tracking issue-tracking
https://github.com/rizinorg/rizin/issues/4910
Issue Tracking issue-tracking patch
https://github.com/rizinorg/rizin/pull/4762

Scores

CVSS v3 5.3
EPSS 0.0003
EPSS Percentile 8.7%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact partial

Details

CWE
CWE-119 CWE-122
Status published
Products (1)
rizin/rizin < 0.8.0
Published Mar 01, 2025
Tracked Since Feb 18, 2026