CVE-2025-5648Improper Restriction of Operations within the Bounds of a Memory Buffer in Radare2

Severity
2.0LOWNVD
EPSS
0.1%
top 64.84%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedJun 5
Latest updateDec 6

Description

A vulnerability was found in Radare2 5.9.9. It has been classified as problematic. Affected is the function r_cons_pal_init in the library /libr/cons/pal.c of the component radiff2. The manipulation of the argument -T leads to memory corruption. An attack has to be approached locally. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. The real existence of this vulnerability is still doubted at the

CVSS vector

CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Affected Packages3 packages

debiandebian/radare2< radare2 6.0.4+dfsg-1 (sid)
NVDradare/radare25.9.9
Linuxlinux/linux_kernel3.14.05.4.302+6

Patches

🔴Vulnerability Details

3
OSV
Bluetooth: 6lowpan: reset link-local header on ipv6 recv path2025-12-06
OSV
CVE-2025-5648: A vulnerability was found in Radare2 52025-06-05
GHSA
GHSA-m9vf-v59m-rpvj: A vulnerability was found in Radare2 52025-06-05

📋Vendor Advisories

2
Red Hat
kernel: Bluetooth: 6lowpan: reset link-local header on ipv6 recv path2025-12-06
Debian
CVE-2025-5648: radare2 - A vulnerability was found in Radare2 5.9.9. It has been classified as problemati...2025