CVE-2025-70085 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: February 12, 2026
OpenSatKit - Buffer Overflow
Overview
OpenSatKit 2.2.1 contains a stack buffer overflow caused by unsafe sprintf usage without length checks in EventErrStr buffer in file.c, letting attackers cause memory corruption, exploit requires crafted input filenames.
Severity & Score
Impact
Attackers can cause memory corruption leading to potential code execution or application crash.
Mitigation
Update to a version that uses bounded format specifiers or apply patches to validate buffer lengths.
References
Social Media Activity(1 post)
š“ CVE-2025-70085 - Critical (9.8) An issue was discovered in OpenSatKit 2.2.1. The EventErrStr buffer has a fixed size of 256 bytes. The code uses sprintf to format two filenames (Source1Filename and the string returned by FileUtil_FileStateStr) into this buffer without any length... š https://www.thehackerwire.com/vulnerability/CVE-2025-70085/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2025-70085
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- buffer_overflow
- Status
- unconfirmed
- EPSS
- 4.4%
- Social Posts
- 1
CWE
- CWE-121
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H