Vulnerability Description
AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigger a massive Heap Buffer Overflow by sending a malformed MQTT packet with a manipulated Topic Length field. This leads to an immediate Denial of Service (DoS) and, when used as a library, severe Memory Corruption that can be leveraged for Remote Code Execution (RCE). This issue has been patched in version 0.64.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Aiscatcher | Ais-Catcher | < 0.64 |
Related Weaknesses (CWE)
References
- https://github.com/jvde-github/AIS-catcher/commit/e0f7242eee659909adc11a4c561c3fPatch
- https://github.com/jvde-github/AIS-catcher/security/advisories/GHSA-93mj-c8q3-69ExploitVendor Advisory
- https://github.com/jvde-github/AIS-catcher/security/advisories/GHSA-93mj-c8q3-69ExploitVendor Advisory
FAQ
What is CVE-2025-66217?
CVE-2025-66217 is a vulnerability with a CVSS score of 7.5 (HIGH). AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigge...
How severe is CVE-2025-66217?
CVE-2025-66217 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-66217?
Check the references section above for vendor advisories and patch information. Affected products include: Aiscatcher Ais-Catcher.