Impact
BlueKitchen BTstack versions before 1.8.1 contain an out‑of‑bounds read bug in the AVRCP Controller GET_PLAYER_APPLICATION_SETTING_ATTRIBUTE_TEXT and GET_PLAYER_APPLICATION_SETTING_VALUE_TEXT handlers. When a nearby attacker establishes a paired Bluetooth Classic connection and sends specially crafted VENDOR_DEPENDENT responses, the stack reads memory beyond the packet boundaries. This can expose sensitive data to the attacker and may also lead to a crash of the affected application, classifying the weakness as CWE‑125 – Out‑of‑Bounds Read.
Affected Systems
The product is BlueKitchen GmbH’s BTstack. All releases earlier than version 1.8.1 are vulnerable; upgrading to BTstack 1.8.1 or later removes the flaw.
Risk and Exploitability
The CVSS base score of 2.1 indicates a low overall severity, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires a Bluetooth Classic connection in close proximity and a successful pairing with the target device, so the attack vector is local over Bluetooth. While the risk of exploitation is low, any unpatched device in range could leak information or crash when interacting with a malicious remote controller.
OpenCVE Enrichment