CVE-2025-34457

N/A Unknown

📋 TL;DR

A stack-based buffer overflow vulnerability in Dire Wolf's KISS frame processing allows remote unauthenticated attackers to cause denial-of-service through application crashes. The vulnerability occurs when processing specially crafted KISS frames at maximum length, leading to memory corruption. All Dire Wolf users running vulnerable versions are affected.

💻 Affected Systems

Products:
  • wb2osz/direwolf (Dire Wolf)
Versions: All versions up to and including 1.8, prior to commit 694c954
Operating Systems: Linux, Windows, macOS, Raspberry Pi OS
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerable when KISS protocol is enabled and processing frames from untrusted sources.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, though this requires specific memory layout conditions and is less likely than DoS.

🟠

Likely Case

Denial-of-service through application crashes when processing malicious KISS frames from remote sources.

🟢

If Mitigated

No impact if patched or if network controls prevent malicious KISS frame delivery.

🌐 Internet-Facing: MEDIUM - Dire Wolf is often used for amateur radio applications which may be internet-accessible, but requires specific KISS frame delivery.
🏢 Internal Only: LOW - Typically used in controlled radio environments with limited attack surface.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW - Requires sending specially crafted KISS frames to vulnerable instance.

Exploitation requires network access to Dire Wolf's KISS interface and knowledge of maximum frame length triggering conditions.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Commit 694c954 or later

Vendor Advisory: https://github.com/wb2osz/direwolf/commit/694c954

Restart Required: Yes

Instructions:

1. Update to latest Dire Wolf version from GitHub
2. Apply commit 694c954 if building from source
3. Restart Dire Wolf service after update

🔧 Temporary Workarounds

Network Segmentation

linux

Restrict network access to Dire Wolf's KISS interface to trusted sources only.

iptables -A INPUT -p tcp --dport <kiss_port> -s <trusted_ip> -j ACCEPT
iptables -A INPUT -p tcp --dport <kiss_port> -j DROP

Disable KISS Interface

all

Disable KISS protocol if not required for your use case.

Edit direwolf.conf and comment out KISS-related configuration lines

🧯 If You Can't Patch

  • Implement strict network access controls to limit KISS interface exposure
  • Monitor for application crashes and restart Dire Wolf automatically if crashes occur

🔍 How to Verify

Check if Vulnerable:

Check Dire Wolf version with 'direwolf -v' and verify it's 1.8 or earlier without commit 694c954 applied.

Check Version:

direwolf -v 2>&1 | grep -i version

Verify Fix Applied:

Verify version is after commit 694c954 or check if KISS frame processing handles maximum length frames without crashing.

📡 Detection & Monitoring

Log Indicators:

  • Dire Wolf process crashes
  • Segmentation fault errors in system logs
  • KISS frame processing errors

Network Indicators:

  • Unusual KISS frame traffic patterns
  • Maximum length KISS frames from unexpected sources

SIEM Query:

process.name="direwolf" AND (event.action="crashed" OR syslog.message:"segmentation fault")

🔗 References

📤 Share & Export