Meshtastic is an open source mesh networking solution. A fault in the handling of mesh packets containing invalid protobuf data can result in an attacker-controlled buffer overflow, allowing an attacker to hijack execution flow, potentially resulting in remote code execution. This attack does not require authentication or user interaction, as long as the target device rebroadcasts packets on the default channel. This vulnerability fixed in 2.6.2.
History

Tue, 15 Apr 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 14 Apr 2025 23:45:00 +0000

Type Values Removed Values Added
Description Meshtastic is an open source mesh networking solution. A fault in the handling of mesh packets containing invalid protobuf data can result in an attacker-controlled buffer overflow, allowing an attacker to hijack execution flow, potentially resulting in remote code execution. This attack does not require authentication or user interaction, as long as the target device rebroadcasts packets on the default channel. This vulnerability fixed in 2.6.2.
Title Meshtastic incorrectly hands malformed packets leads to controlled buffer overflow
Weaknesses CWE-119
CWE-122
References
Metrics cvssV3_1

{'score': 9.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-04-15T02:55:53.769Z

Reserved: 2025-01-23T17:11:35.838Z

Link: CVE-2025-24797

cve-icon Vulnrichment

Updated: 2025-04-15T02:55:49.194Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-04-15T00:15:14.353

Modified: 2025-04-15T18:39:27.967

Link: CVE-2025-24797

cve-icon Redhat

No data.