Meshtastic is an open source mesh networking solution. Prior to v2.6.3, an attacker can send NodeInfo with a empty publicKey first, then overwrite it with a new key. First sending a empty key bypasses 'if (p.public_key.size > 0) {', clearing the existing publicKey (and resetting the size to 0) for a known node. Then a new key bypasses 'if (info->user.public_key.size > 0) {', and this malicious key is stored in NodeDB. This vulnerability is fixed in 2.6.3.
Metrics
Affected Vendors & Products
References
History
Thu, 21 Aug 2025 12:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Meshtastic
Meshtastic firmware |
|
Vendors & Products |
Meshtastic
Meshtastic firmware |
Mon, 18 Aug 2025 18:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Mon, 18 Aug 2025 17:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Meshtastic is an open source mesh networking solution. Prior to v2.6.3, an attacker can send NodeInfo with a empty publicKey first, then overwrite it with a new key. First sending a empty key bypasses 'if (p.public_key.size > 0) {', clearing the existing publicKey (and resetting the size to 0) for a known node. Then a new key bypasses 'if (info->user.public_key.size > 0) {', and this malicious key is stored in NodeDB. This vulnerability is fixed in 2.6.3. | |
Title | Meshtastic allows crafting of specific NodeInfo packets that overwrite any publicKey saved in the NodeDB | |
Weaknesses | CWE-287 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-08-18T17:24:35.254Z
Updated: 2025-08-18T17:41:25.082Z
Reserved: 2025-08-12T16:15:30.237Z
Link: CVE-2025-55293

Updated: 2025-08-18T17:41:16.037Z

Status : Awaiting Analysis
Published: 2025-08-18T18:15:39.590
Modified: 2025-08-18T20:16:28.750
Link: CVE-2025-55293

No data.