Description
For Realtek AmebaD devices, a heap-based buffer overflow was discovered in Ameba-AIoT ameba-arduino-d before version 3.1.9 and ameba-rtos-d before commit c2bfd8216a1cbc19ad2ab5f48f372ecea756d67a on 2025/07/03. In the WLAN driver defragment function, lack of validation of the size of fragmented Wi-Fi frames may lead to a heap-based buffer overflow.
References (3)
Core 3
Core References
Various Sources
https://www.amebaiot.com/en/security-bulletin-cve-2025-49604/
Issue Tracking
https://github.com/Ameba-AIoT/ameba-arduino-d/pull/281
Scores
CVSS v3
5.4
EPSS
0.0007
EPSS Percentile
21.3%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-122
Status
published
Published
Jul 09, 2025
Tracked Since
Feb 18, 2026