CVE-2025-57155
Published: 20 January 2026
Summary
CVE-2025-57155 is a high-severity NULL Pointer Dereference (CWE-476) vulnerability in Owntone Owntone Server. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 36.3th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
NULL pointer dereference enables remote application crash for DoS via software exploitation.
NVD Description
NULL pointer dereference in the daap_reply_groups function in src/httpd_daap.c in owntone-server through commit 5e6f19a (newer commit after version 28.2) allows remote attackers to cause a Denial of Service.
Deeper analysisAI
CVE-2025-57155 is a NULL pointer dereference vulnerability in the daap_reply_groups function within src/httpd_daap.c of owntone-server, affecting the software through commit 5e6f19a, a newer commit after version 28.2. This issue, mapped to CWE-476, carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), highlighting its potential for high-impact availability disruption without confidentiality or integrity effects.
Remote attackers can exploit this vulnerability over the network with low complexity, requiring no privileges or user interaction. Successful exploitation triggers a NULL pointer dereference, causing a denial of service through server crashes.
Advisories and patches provide mitigation guidance, including the security advisory at https://github.com/archersec/security-advisories/blob/master/owntone-server/owntone-server-advisory-2025.md and the fixing commit at https://github.com/owntone/owntone-server/commit/d857116e4143a500d6a1ea13f4baa057ba3b0028. Practitioners should consult these references for detailed remediation steps, such as applying the patch or upgrading to a fixed version.
Details
- CWE(s)