AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigger a massive Heap Buffer Overflow by sending a malformed MQTT packet with a manipulated Topic Length field. This leads to an immediate Denial of Service (DoS) and, when used as a library, severe Memory Corruption that can be leveraged for Remote Code Execution (RCE). This issue has been patched in version 0.64.
Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 01 Dec 2025 15:30:00 +0000

Type Values Removed Values Added
First Time appeared Ais-catcher Project
Ais-catcher Project ais-catcher
Vendors & Products Ais-catcher Project
Ais-catcher Project ais-catcher

Mon, 01 Dec 2025 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Sat, 29 Nov 2025 02:30:00 +0000

Type Values Removed Values Added
Description AIS-catcher is a multi-platform AIS receiver. Prior to version 0.64, an integer underflow vulnerability exists in the MQTT parsing logic of AIS-catcher. This vulnerability allows an attacker to trigger a massive Heap Buffer Overflow by sending a malformed MQTT packet with a manipulated Topic Length field. This leads to an immediate Denial of Service (DoS) and, when used as a library, severe Memory Corruption that can be leveraged for Remote Code Execution (RCE). This issue has been patched in version 0.64.
Title AIS-catcher Integer Underflow in MQTT Packet Parsing leading to Heap Buffer Overflow
Weaknesses CWE-122
CWE-191
References
Metrics cvssV4_0

{'score': 8.8, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2025-12-01T14:11:01.007Z

Reserved: 2025-11-24T23:01:29.678Z

Link: CVE-2025-66217

cve-icon Vulnrichment

Updated: 2025-12-01T13:52:49.406Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-11-29T03:15:59.880

Modified: 2025-12-01T15:39:33.110

Link: CVE-2025-66217

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2025-12-01T15:18:25Z