CVE-2025-24798
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-07-10

Last updated on: 2025-08-22

Assigner: GitHub, Inc.

Description
Meshtastic is an open source mesh networking solution. From 1.2.1 until 2.6.2, a packet sent to the routing module that contains want_response==true causes a crash. This can lead to a degradation of service for nodes within range of a malicious sender, or via MQTT if downlink is enabled. This vulnerability is fixed in 2.6.2.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-07-10
Last Modified
2025-08-22
Generated
2026-05-09
AI Q&A
2025-07-11
EPSS Evaluated
2026-05-08
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
meshtastic meshtastic_firmware From 1.2.1 (inc) to 2.6.2 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-617 The product contains an assert() or similar statement that can be triggered by an attacker, which leads to an application exit or other behavior that is more severe than necessary.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability in Meshtastic occurs when a specially crafted packet with the field want_response set to true is sent to the routing module. This causes the module to crash, leading to a denial of service condition for nodes within range of the attacker or via MQTT if downlink is enabled. It affects versions from 1.2.1 up to 2.6.2 and is fixed in version 2.6.2.


How can this vulnerability impact me? :

The vulnerability can cause a crash in the routing module of Meshtastic nodes, resulting in a degradation of service or denial of service for affected nodes. This means that communication within the mesh network can be disrupted by a malicious sender, potentially impacting network availability and reliability.


What immediate steps should I take to mitigate this vulnerability?

Upgrade Meshtastic to version 2.6.2 or later, as this version contains the fix for the vulnerability that causes a crash when a packet with want_response==true is sent to the routing module.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart