An issue was discovered in OpenSatKit 2.2.1. The DirName field in the telecommand is provided by the ground segment and must be treated as untrusted input. The program copies DirName into the local buffer DirWithSep using strcpy. The size of this buffer is OS_MAX_PATH_LEN. If the length of DirName is greater than or equal to OS_MAX_PATH_LEN, a stack buffer overflow occurs, overwriting adjacent stack memory. The path length check (FileUtil_AppendPathSep) is performed after the strcpy operation, meaning the validation occurs too late and cannot prevent the overflow.
References
Configurations
History
17 Feb 2026, 15:03
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:opensatkit:opensatkit:2.2.1:*:*:*:*:*:*:* | |
| References | () https://gist.github.com/jonafk555 - Third Party Advisory | |
| References | () https://github.com/OpenSatKit/OpenSatKit - Product | |
| References | () https://github.com/OpenSatKit/OpenSatKit/releases/tag/v2.2.1 - Release Notes | |
| References | () https://raw.githubusercontent.com/OpenSatKit/OpenSatKit/master/cfs/apps/filemgr/fsw/src/dir.c - Product | |
| References | () https://raw.githubusercontent.com/OpenSatKit/OpenSatKit/master/cfs/apps/filemgr/fsw/src/dir.c#:~:text=strcpy%28DirWithSep - Product | |
| First Time |
Opensatkit opensatkit
Opensatkit |
12 Feb 2026, 15:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
| CWE | CWE-121 |
11 Feb 2026, 18:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-11 18:16
Updated : 2026-02-17 15:03
NVD link : CVE-2025-70083
Mitre link : CVE-2025-70083
CVE.ORG link : CVE-2025-70083
JSON object : View
Products Affected
opensatkit
- opensatkit
CWE
CWE-121
Stack-based Buffer Overflow
