hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.
References
| Link | Resource |
|---|---|
| https://jvn.jp/en/jp/JVN19358384/ | Third Party Advisory |
| https://w1.fi/cgit/hostap/commit/?id=339a334551ca911187cc870f4f97ef08e11db109 | Patch |
| https://w1.fi/cgit/hostap/commit/?id=726432d7622cc0088ac353d073b59628b590ea44 | Patch |
| https://w1.fi/hostapd/ | Product |
Configurations
History
No history.
Information
Published : 2025-03-12 05:15
Updated : 2025-10-24 18:40
NVD link : CVE-2025-24912
Mitre link : CVE-2025-24912
CVE.ORG link : CVE-2025-24912
JSON object : View
Products Affected
w1.fi
- hostapd
CWE
CWE-826
Premature Release of Resource During Expected Lifetime
