CVE-2025-34449
Unknown Unknown - Not Provided
Global Buffer Overflow in scrcpy Causes Memory Corruption

Publication date: 2025-12-18

Last updated on: 2025-12-18

Assigner: VulnCheck

Description
Genymobile/scrcpy versions up to and including 3.3.3 and prior to commit 3e40b24 contain a global buffer overflow vulnerability in the function sc_read32be, invoked via sc_device_msg_deserialize() and process_msgs(). Processing crafted device messages can cause reads beyond the bounds of a global buffer, leading to memory corruption or crashes. This vulnerability can be exploited to cause a denial of service and, under certain conditions, may be leveraged for further exploitation depending on the execution environment and available mitigations.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-18
Last Modified
2025-12-18
Generated
2026-05-07
AI Q&A
2025-12-19
EPSS Evaluated
2026-05-05
NVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
genymobile scrcpy 3.3.3
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a global buffer overflow in Genymobile/scrcpy versions up to 3.3.3 and prior to a specific commit. It occurs in the function sc_read32be, which is called through sc_device_msg_deserialize() and process_msgs(). When processing specially crafted device messages, the software can read beyond the bounds of a global buffer, causing memory corruption or crashes.


How can this vulnerability impact me? :

The vulnerability can cause a denial of service by crashing the application. Under certain conditions, it may also be exploited further depending on the execution environment and available mitigations, potentially leading to more severe impacts.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart