CVE-2025-68474

Published: Dic 27, 2025 Last Modified: Gen 22, 2026
ExploitDB:
Other exploit source:
Google Dorks:
MEDIUM 6,1
Attack Vector: adjacent
Attack Complexity: low
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
HIGH 7,6
Attack Vector: adjacent_network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: low
Integrity: low
Availability: high

Description

AI Translation Available

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.1, 5.4.3, 5.3.4, 5.2.6, 5.1.6, and earlier, in the avrc_vendor_msg() function of the ESP-IDF BlueDroid AVRCP stack, the allocated buffer size was validated using AVRC_MIN_CMD_LEN (20 bytes). However, the actual fixed header data written before the vendor payload exceeds this value. This totals 29 bytes written before p_msg->p_vendor_data is copied. Using the old AVRC_MIN_CMD_LEN could allow an out-of-bounds write if vendor_len approaches the buffer limit. For commands where vendor_len is large, the original buffer allocation may be insufficient, causing writes beyond the allocated memory. This can lead to memory corruption, crashes, or other undefined behavior. The overflow could be larger when assertions are disabled.

EPSS (Exploit Prediction Scoring System)

Trend Analysis

EPSS (Exploit Prediction Scoring System)

Prevede la probabilità di sfruttamento basata su intelligence sulle minacce e sulle caratteristiche della vulnerabilità.

EPSS Score
0,0003
Percentile
0,1th
Updated

EPSS Score Trend (Last 79 Days)

787

Out-of-bounds Write

Draft
Common Consequences
Security Scopes Affected:
Integrity Availability Other
Potential Impacts:
Modify Memory Execute Unauthorized Code Or Commands Dos: Crash, Exit, Or Restart Unexpected State
Applicable Platforms
Languages: Assembly, C, C++, Memory-Unsafe
Technologies: ICS/OT
View CWE Details
Application

Esp-Idf by Espressif

cpe:2.3:a:espressif:esp-idf:5.2.6:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Esp-Idf by Espressif

cpe:2.3:a:espressif:esp-idf:5.4.3:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Esp-Idf by Espressif

cpe:2.3:a:espressif:esp-idf:5.1.6:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Esp-Idf by Espressif

cpe:2.3:a:espressif:esp-idf:5.3.4:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
Application

Esp-Idf by Espressif

cpe:2.3:a:espressif:esp-idf:5.5.1:*:*:*:*:*:*:*
Common Platform Enumeration - Standardized vulnerability identification
https://github.com/espressif/esp-idf/commit/0b0b59f2e19cb99dfa1b28c284d1c5c1d27…
https://github.com/espressif/esp-idf/commit/565fa98d0cfd58102204c1cb636747e17ee…
https://github.com/espressif/esp-idf/commit/8262ee807d5cd425f66304f703eeb3382fb…
https://github.com/espressif/esp-idf/commit/a6c1bc5e3e91ad1cb964ce2c178ee40a5d1…
https://github.com/espressif/esp-idf/commit/aa0e3d75db995b7137b55349fc92ee684b4…
https://github.com/espressif/esp-idf/commit/b9ba1e29b65536ab4b670ac099585d09adc…
https://github.com/espressif/esp-idf/security/advisories/GHSA-43gh-7r4f-qp57