Description
merbanan/rtl_433 versions up to and including 25.02 and prior to commit 25e47f8 contain a stack-based buffer overflow vulnerability in the function parse_rfraw() located in src/rfraw.c. When processing crafted or excessively large raw RF input data, the application may write beyond the bounds of a stack buffer, resulting in memory corruption or a crash. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.
References (4)
Core 4
Core References
Exploit, Third Party Advisory technical-description
exploit
https://github.com/marlinkcyber/advisories/blob/main/advisories/MCSAID-2025-004-rtl_433-rfraw-parse-overflow.md
Exploit, Issue Tracking, Patch issue-tracking
https://github.com/merbanan/rtl_433/issues/3375
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/merbanan-rtl-433-stack-based-buffer-overflow
Scores
CVSS v3
7.8
EPSS
0.0003
EPSS Percentile
8.0%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
partial
Details
CWE
CWE-121
CWE-787
Status
published
Products (3)
merbanan/rtl_433
< 25.02
merbanan/rtl_433
25e47f8932f0401392ef1d3c8cc9ed5595bc894a
rtl_433_project/rtl_433
< 25.02
Published
Dec 18, 2025
Tracked Since
Feb 18, 2026