AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigger a massive Heap Buffer Overflow by sending a malformed MQTT packet with a manipulated Topic Length field. This leads to an immediate Denial of Service (DoS) and, when used as a library, severe Memory Corruption that can be leveraged for Remote Code Execution (RCE). This issue has been patched in version 0.64.
CVSS
No CVSS.
References
Configurations
No configuration.
History
01 Dec 2025, 14:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/jvde-github/AIS-catcher/security/advisories/GHSA-93mj-c8q3-69rg - |
29 Nov 2025, 03:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-11-29 03:15
Updated : 2025-12-01 15:39
NVD link : CVE-2025-66217
Mitre link : CVE-2025-66217
CVE.ORG link : CVE-2025-66217
JSON object : View
Products Affected
No product.
