An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by the ground segment and must be treated as untrusted input. The program copies DirName into the local buffer DirWithSep using strcpy. The size of this buffer is OS_MAX_PATH_LEN. If the length of DirName is greater than or equal to OS_MAX_PATH_LEN, a stack buffer overflow occurs, overwriting adjacent stack memory. The path length check (FileUtil_AppendPathSep) is performed after the strcpy operation, meaning the validation occurs too late and cannot prevent the overflow.
Metrics
Affected Vendors & Products
References
History
Thu, 12 Feb 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Thu, 12 Feb 2026 11:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Opensatkit
Opensatkit opensatkit |
|
| Vendors & Products |
Opensatkit
Opensatkit opensatkit |
Wed, 11 Feb 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by the ground segment and must be treated as untrusted input. The program copies DirName into the local buffer DirWithSep using strcpy. The size of this buffer is OS_MAX_PATH_LEN. If the length of DirName is greater than or equal to OS_MAX_PATH_LEN, a stack buffer overflow occurs, overwriting adjacent stack memory. The path length check (FileUtil_AppendPathSep) is performed after the strcpy operation, meaning the validation occurs too late and cannot prevent the overflow. | |
| References |
|
|
Status: PUBLISHED
Assigner: mitre
Published: 2026-02-11T00:00:00.000Z
Updated: 2026-02-12T14:55:55.149Z
Reserved: 2026-01-09T00:00:00.000Z
Link: CVE-2025-70083
Updated: 2026-02-12T14:55:50.349Z
Status : Awaiting Analysis
Published: 2026-02-11T18:16:06.337
Modified: 2026-02-12T15:16:04.773
Link: CVE-2025-70083
No data.