Impact
The flaw occurs in the apriltag_detector_detect function within the apriltag.c source file of the AprilRobotics apriltag library, versions up to 3.4.5. An attacker that can execute code locally can supply crafted inputs that trigger a memory corruption bug. The description does not state that the corruption leads to arbitrary code execution or privilege escalation, but the breach of memory integrity could potentially be leveraged for further exploitation depending on the surrounding context.
Affected Systems
AprilRobotics’ apriltag library, with affected releases up to and including version 3.4.5. Any deployment that uses these versions is vulnerable; newer releases are not impacted.
Risk and Exploitability
The CVSS score of 4.8 places the vulnerability in the moderate range, and the EPSS score of less than 1% signals a low probability that active exploitation will occur. The vulnerability is not listed in the CISA KEV catalog, and the attack vector is local. Because the exploit requires local execution, the risk is limited to environments where an attacker can run arbitrary code on the host that uses the apriltag library. The associated CWE-119 identifies the flaw as a buffer or memory safety issue.
OpenCVE Enrichment