Executive Summary



This vulnerability is currently undergoing analysis and not all information is available. Please check back soon to view the completed vulnerability summary
Informations
Name CVE-2025-52471 First vendor Publication 2025-06-24
Vendor Cve Last vendor Modification 2025-06-24

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
 
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector :
Cvss Base Score N/A Attack Range N/A
Cvss Impact Score N/A Attack Complexity N/A
Cvss Expoit Score N/A Authentication N/A
Calculate full CVSS 2.0 Vectors scores

Detail

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. An integer underflow vulnerability has been identified in the ESP-NOW protocol implementation within the ESP Wi-Fi component of versions 5.4.1, 5.3.3, 5.2.5, and 5.1.6 of the ESP-IDF framework. This issue stems from insufficient validation of user-supplied data length in the packet receive function. Under certain conditions, this may lead to out-of-bounds memory access and may allow arbitrary memory write operations. On systems without a memory protection scheme, this behavior could potentially be used to achieve remote code execution (RCE) on the target device. In versions 5.4.2, 5.3.4, 5.2.6, and 5.1.6, ESP-NOW has added more comprehensive validation logic on user-supplied data length during packet reception to prevent integer underflow caused by negative value calculations. For ESP-IDF v5.3 and earlier, a workaround can be applied by validating that the `data_len` parameter received in the RX callback (registered via `esp_now_register_recv_cb()`) is a positive value before further processing. For ESP-IDF v5.4 and later, no application-level workaround is available. Users are advised to upgrade to a patched version of ESP-IDF to take advantage of the built-in mitigation.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2025-52471

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-191 Integer Underflow (Wrap or Wraparound)

Sources (Detail)

https://github.com/espressif/esp-idf/commit/b1a379d57430d265a53aca13d59ddfbf2...
https://github.com/espressif/esp-idf/commit/c5fc81917805f99e687c81cc56b68dc5d...
https://github.com/espressif/esp-idf/commit/d4dafbdc3572387cd4f9a62b776580bc4...
https://github.com/espressif/esp-idf/commit/d6ec5a52255b17c1d6ef379e89f9de2c3...
https://github.com/espressif/esp-idf/commit/df7757d8279871fa7a2f42ef3962c6c1e...
https://github.com/espressif/esp-idf/commit/edc227c5eaeced999b5212943a9434379...
https://github.com/espressif/esp-idf/security/advisories/GHSA-hqhh-cp47-fv5g
Source Url

Alert History

If you want to see full details history, please login or register.
0
Date Informations
2025-06-25 05:20:32
  • First insertion