We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability was found in PX4-Autopilot 1.12.3. It has been classified as problematic. This affects the function MavlinkReceiver::handle_message_trajectory_representation_waypoints of the file mavlink_receiver.cpp of the component TRAJECTORY_REPRESENTATION_WAYPOINTS Message Handler. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed to the public and may be used.
Es wurde eine Schwachstelle in PX4-Autopilot 1.12.3 ausgemacht. Sie wurde als problematisch eingestuft. Es geht dabei um die Funktion MavlinkReceiver::handle_message_trajectory_representation_waypoints der Datei mavlink_receiver.cpp der Komponente TRAJECTORY_REPRESENTATION_WAYPOINTS Message Handler. Durch die Manipulation mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen. Der Exploit steht zur öffentlichen Verfügung.
2025-06-04: | Advisory disclosed |
2025-06-04: | VulDB entry created |
2025-06-04: | VulDB entry last update |
wwsshh (VulDB User)
vuldb.com/?id.311127 (VDB-311127 | PX4-Autopilot TRAJECTORY_REPRESENTATION_WAYPOINTS Message mavlink_receiver.cpp stack-based overflow)
vuldb.com/?ctiid.311127 (VDB-311127 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.584889 (Submit #584889 | px4 1.12.3 stack-buffer-overflow)
github.com/PX4/PX4-Autopilot/issues/24915
github.com/PX4/PX4-Autopilot/issues/24915
Support options