CVE-2025-34449
CRITICALGenymotion Scrcpy < 3.3.4 - Insecure Deserialization
Title source: ruleDescription
Genymobile/scrcpy versions up to and including 3.3.3, prior to commit 3e40b24, contain a buffer overflow vulnerability in the sc_device_msg_deserialize() function. A compromised device can send crafted messages that cause out-of-bounds reads, which may result in memory corruption or a denial-of-service condition. This vulnerability may allow further exploitation on the host system.
References (4)
Core 4
Core References
Exploit, Third Party Advisory technical-description
exploit
https://github.com/marlinkcyber/advisories/blob/main/advisories/MCSAID-2025-003-scrcpy-global-buffer-overflow.md
Exploit, Issue Tracking, Patch issue-tracking
https://github.com/Genymobile/scrcpy/issues/6415
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/genymobile-scrcpy-global-buffer-overflow
Scores
CVSS v3
9.1
EPSS
0.0008
EPSS Percentile
24.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-502
Status
published
Products (3)
Genymobile/scrcpy
< 3.3.3
Genymobile/scrcpy
3e40b2473772cea3a23d4932088fd0bc4cc0f52c
genymotion/scrcpy
< 3.3.4
Published
Dec 18, 2025
Tracked Since
Feb 18, 2026