Impact
BlueKitchen BTstack versions earlier than 1.8.1 contain an out-of-bounds read in the AVRCP Controller GET_PLAYER_APPLICATION_SETTING_*_TEXT handlers. This flaw enables attackers to read memory beyond the expected packet boundaries, potentially exposing sensitive information and causing device instability or crashes. The weakness is catalogued as a classic buffer over-read (CWE‑125).
Affected Systems
The affected product is BlueKitchen BTstack. Any installation of BTstack built before release version 1.8.1 is susceptible.
Risk and Exploitability
The vulnerability carries a CVSS score of 2.1, indicating low overall severity, and an EPSS probability below 1 %. It is not listed in the CISA KEV catalog. Attackers must first pair a device with Bluetooth Classic and then send specially crafted VENDOR_DEPENDENT responses to trigger the out-of-bounds read. The required conditions suggest that the exploit is limited to nearby attackers with physical proximity or the ability to establish a Bluetooth link, but the risk is still present for devices in vulnerable environments.
OpenCVE Enrichment