Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-7660 | hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Fri, 24 Oct 2025 18:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
W1.fi
W1.fi hostapd |
|
| CPEs | cpe:2.3:a:w1.fi:hostapd:*:*:*:*:*:*:*:* | |
| Vendors & Products |
W1.fi
W1.fi hostapd |
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 13 Mar 2025 02:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | hostapd: RADIUS Packet Processing Flaw in hostapd | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Wed, 12 Mar 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 12 Mar 2025 05:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail. | |
| Weaknesses | CWE-826 | |
| References |
| |
| Metrics |
cvssV3_0
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2025-03-12T13:21:59.254Z
Reserved: 2025-01-28T07:05:59.180Z
Link: CVE-2025-24912
Updated: 2025-03-12T13:21:56.027Z
Status : Analyzed
Published: 2025-03-12T05:15:37.430
Modified: 2025-10-24T18:40:03.117
Link: CVE-2025-24912
OpenCVE Enrichment
No data.
EUVD