wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition.

Project Subscriptions

Vendors Products
Dire Wolf Subscribe
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Wed, 24 Dec 2025 12:00:00 +0000

Type Values Removed Values Added
First Time appeared Wb2osz
Wb2osz dire Wolf
Vendors & Products Wb2osz
Wb2osz dire Wolf

Tue, 23 Dec 2025 15:15:00 +0000

Type Values Removed Values Added
Title wb2osz/direwolf <= 1.8 Stack-based Buffer Overflow DoS wb2osz/direwolf <= 1.8.1 Stack-based Buffer Overflow DoS

Tue, 23 Dec 2025 12:15:00 +0000

Type Values Removed Values Added
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

threat_severity

Important


Mon, 22 Dec 2025 22:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 22 Dec 2025 21:45:00 +0000

Type Values Removed Values Added
Description wb2osz/direwolf (Dire Wolf) versions up to and including 1.8, prior to commit 694c954, contain a stack-based buffer overflow vulnerability in the function kiss_rec_byte() located in src/kiss_frame.c. When processing crafted KISS frames that reach the maximum allowed frame length (MAX_KISS_LEN), the function appends a terminating FEND byte without reserving sufficient space in the stack buffer. This results in an out-of-bounds write followed by an out-of-bounds read during the subsequent call to kiss_unwrap(), leading to stack memory corruption or application crashes. This vulnerability may allow remote unauthenticated attackers to trigger a denial-of-service condition.
Title wb2osz/direwolf <= 1.8 Stack-based Buffer Overflow DoS
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2025-12-23T15:03:18.273Z

Reserved: 2025-04-15T19:15:22.603Z

Link: CVE-2025-34457

cve-icon Vulnrichment

Updated: 2025-12-22T21:53:49.373Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-12-22T22:16:04.493

Modified: 2025-12-23T14:51:52.650

Link: CVE-2025-34457

cve-icon Redhat

Severity : Important

Publid Date: 2025-12-22T21:30:29Z

Links: CVE-2025-34457 - Bugzilla

cve-icon OpenCVE Enrichment

Updated: 2025-12-24T11:53:26Z

Weaknesses