Home

Description

AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigger a massive Heap Buffer Overflow by sending a malformed MQTT packet with a manipulated Topic Length field. This leads to an immediate Denial of Service (DoS) and, when used as a library, severe Memory Corruption that can be leveraged for Remote Code Execution (RCE). This issue has been patched in version 0.64.

PUBLISHED Reserved 2025-11-24 | Published 2025-11-29 | Updated 2025-12-01 | Assigner GitHub_M




HIGH: 8.8CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-122: Heap-based Buffer Overflow

CWE-191: Integer Underflow (Wrap or Wraparound)

Product status

< 0.64
affected

References

github.com/...atcher/security/advisories/GHSA-93mj-c8q3-69rg exploit

github.com/...atcher/security/advisories/GHSA-93mj-c8q3-69rg

github.com/...ommit/e0f7242eee659909adc11a4c561c3f7011bdefe7

cve.org (CVE-2025-66217)

nvd.nist.gov (CVE-2025-66217)

Download JSON