Description

tcpflow is a TCP/IP packet demultiplexer. In versions up to and including 1.61, wifipcap parses 802.11 management frame elements and performs a length check on the wrong field when handling the TIM element. A crafted frame with a large TIM length can cause a 1-byte out-of-bounds write past `tim.bitmap[251]`. The overflow is small and DoS is the likely impact; code execution is potential, but still up in the air. The affected structure is stack-allocated in `handle_beacon()` and related handlers. As of time of publication, no known patches are available.

INFO

Published Date :

2026-01-29T21:42:47.013Z

Last Modified :

2026-02-10T20:14:00.298Z

Source :

GitHub_M
AFFECTED PRODUCTS

The following products are affected by CVE-2026-25061 vulnerability.

Vendors Products
Debian
  • Debian Linux
Digitalcorpora
  • Tcpflow
Simsong
  • Tcpflow
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-25061.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability
Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality Impact
Integrity Impact
Availability Impact