Buffer Overflow Affecting riot-os/riot package, versions [,2025.07-rc1)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.1% (28th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-RIOTOSRIOT-12427120
  • published2 Sept 2025
  • disclosed18 Jul 2025
  • creditNam

Introduced: 18 Jul 2025

CVE-2025-53888  (opens in a new tab)
CWE-120  (opens in a new tab)

How to fix?

Upgrade riot-os/riot to version 2025.07-rc1 or higher.

Overview

Affected versions of this package are vulnerable to Buffer Overflow due to ineffective size check implemented with assert() in the l2filter.c file. An attacker can execute arbitrary code or cause a denial of service by supplying a crafted addr_len value that exceeds the expected maximum, leading to memory corruption during the memcpy operation when assertions are disabled.

CVSS Base Scores

version 4.0
version 3.1