Description
Meshtastic is an open source mesh networking solution. A fault in the handling of mesh packets containing invalid protobuf data can result in an attacker-controlled buffer overflow, allowing an attacker to hijack execution flow, potentially resulting in remote code execution. This attack does not require authentication or user interaction, as long as the target device rebroadcasts packets on the default channel. This vulnerability fixed in 2.6.2.
INFO
Published Date :
2025-04-14T23:25:19.152Z
Last Modified :
2025-04-21T14:10:47.019Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2025-24797 vulnerability.
| Vendors | Products |
|---|---|
| Meshtastic |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2025-24797.
CVSS Vulnerability Scoring System
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact