Genymobile/scrcpy versions up to and including 3.3.3, prior to commit 3e40b24, contain a buffer overflow vulnerability in the sc_device_msg_deserialize() function. A compromised device can send crafted messages that cause out-of-bounds reads, which may result in memory corruption or a denial-of-service condition. This vulnerability may allow further exploitation on the host system.
References
| Link | Resource |
|---|---|
| https://github.com/Genymobile/scrcpy/commit/3e40b24 | Patch |
| https://github.com/Genymobile/scrcpy/issues/6415 | Exploit Issue Tracking Patch |
| https://github.com/marlinkcyber/advisories/blob/main/advisories/MCSAID-2025-003-scrcpy-global-buffer-overflow.md | Exploit Third Party Advisory |
| https://www.vulncheck.com/advisories/genymobile-scrcpy-global-buffer-overflow | Third Party Advisory |
| https://github.com/marlinkcyber/advisories/blob/main/advisories/MCSAID-2025-003-scrcpy-global-buffer-overflow.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-12-18 22:15
Updated : 2026-01-03 21:15
NVD link : CVE-2025-34449
Mitre link : CVE-2025-34449
CVE.ORG link : CVE-2025-34449
JSON object : View
Products Affected
genymotion
- scrcpy
CWE
CWE-502
Deserialization of Untrusted Data
