We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-24912



Description

hostapd fails to process crafted RADIUS packets properly. When hostapd authenticates wi-fi devices with RADIUS authentication, an attacker in the position between the hostapd and the RADIUS server may inject crafted RADIUS packets and force RADIUS authentications to fail.

Reserved 2025-01-28 | Published 2025-03-12 | Updated 2025-03-12 | Assigner jpcert


LOW: 3.7CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L

Problem types

Premature Release of Resource During Expected Lifetime

Product status

2.11 and earlier
affected

References

w1.fi/hostapd/

w1.fi/...commit/?id=726432d7622cc0088ac353d073b59628b590ea44

w1.fi/...commit/?id=339a334551ca911187cc870f4f97ef08e11db109

jvn.jp/en/jp/JVN19358384/

cve.org (CVE-2025-24912)

nvd.nist.gov (CVE-2025-24912)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2025-24912

Support options

Helpdesk Chat, Email, Knowledgebase