Meshtastic is an open source mesh networking solution. A fault in the handling of mesh packets containing invalid protobuf data can result in an attacker-controlled buffer overflow, allowing an attacker to hijack execution flow, potentially resulting in remote code execution. This attack does not require authentication or user interaction, as long as the target device rebroadcasts packets on the default channel. This vulnerability fixed in 2.6.2.
{
"cna_assigner": "GitHub_M",
"osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2025/24xxx/CVE-2025-24797.json",
"cwe_ids": [
"CWE-119",
"CWE-122"
]
}[
{
"digest": {
"function_hash": "245210903505394026043325024741897715508",
"length": 1758.0
},
"deprecated": false,
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "src/platform/esp32/main-esp32.cpp",
"function": "esp32Setup"
},
"id": "CVE-2025-24797-11af00a1",
"source": "https://github.com/meshtastic/firmware/commit/31c0e8fa2ca0cce903e73749454324c672c18b4c"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"61906178065152490745645933840680174577",
"28946009239950095414879604145601960566",
"60649532268409851977496238090324167516",
"200634508803862953288748608943237796601",
"244993196823156081938587012998377171933",
"314997957164196178084788819934505000108",
"274879986595756875548178437855315468027",
"182270819984620945240112518637550383490",
"131031132699406139319836751897879463449",
"315061169634299417854061116329323171859",
"13850273912623731527025627215546501489",
"3732993753203446154982775224464466777",
"57701735102792753932437450714014955231",
"151727272169547227909156775003071831656",
"158085038331930558469295460800969735618",
"232610998719035549098107118297606687147",
"131914005922832595584348032757712868036",
"201421653561029527719338601750206488790",
"83125320712499385149269695774695540630",
"275419980576526112675236469812557313254"
]
},
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "src/modules/AdminModule.cpp"
},
"id": "CVE-2025-24797-2480b0c3",
"source": "https://github.com/meshtastic/firmware/commit/31c0e8fa2ca0cce903e73749454324c672c18b4c"
},
{
"digest": {
"function_hash": "108084095104954802032035129130168315302",
"length": 6212.0
},
"deprecated": false,
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "src/mesh/NodeDB.cpp",
"function": "NodeDB::installDefaultConfig"
},
"id": "CVE-2025-24797-2f3989e5",
"source": "https://github.com/meshtastic/firmware/commit/31c0e8fa2ca0cce903e73749454324c672c18b4c"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"249284301546385323913208866798342752033",
"148313737138677794687914364016057942736",
"125503957719484020501243424300724351197",
"190001140620202926798782202257677909227",
"3052219449725424921911434118194674663",
"326526716262538329982181416973430293668",
"220183260852286607517051190966862909215",
"66875154906076421416391399934220641088",
"309957815677007174062473363833019292325",
"185962665488891403066726700657332529563",
"128188205448738089204241983939314957855",
"307694384273612590918886186445643392808"
]
},
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "src/platform/esp32/main-esp32.cpp"
},
"id": "CVE-2025-24797-5291d4f9",
"source": "https://github.com/meshtastic/firmware/commit/31c0e8fa2ca0cce903e73749454324c672c18b4c"
},
{
"digest": {
"threshold": 0.9,
"line_hashes": [
"319846714653623395037710379554644507513",
"293655723608504213056212379130841077548",
"159552122833603300490442198778233625697",
"192545791781481665433966103126359132349",
"120863761192394302846507171525228177771",
"185421457120135663455896398193937494855"
]
},
"deprecated": false,
"signature_type": "Line",
"signature_version": "v1",
"target": {
"file": "src/mesh/NodeDB.cpp"
},
"id": "CVE-2025-24797-9f5505c9",
"source": "https://github.com/meshtastic/firmware/commit/31c0e8fa2ca0cce903e73749454324c672c18b4c"
},
{
"digest": {
"function_hash": "273999714152949001576815024458923749623",
"length": 12256.0
},
"deprecated": false,
"signature_type": "Function",
"signature_version": "v1",
"target": {
"file": "src/modules/AdminModule.cpp",
"function": "AdminModule::handleReceivedProtobuf"
},
"id": "CVE-2025-24797-ccc3d79f",
"source": "https://github.com/meshtastic/firmware/commit/31c0e8fa2ca0cce903e73749454324c672c18b4c"
}
]