CVE-2025-66692
Published: 20 January 2026
Summary
CVE-2025-66692 is a high-severity Buffer Over-read (CWE-126) vulnerability in Trustwallet Trust Wallet Core. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 22.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer over-read in PublicKey::verify() directly enables remote unauthenticated application exploitation leading to crash/DoS (T1499.004).
NVD Description
A buffer over-read in the PublicKey::verify() method of Binance - Trust Wallet Core before commit 5668c67 allows attackers to cause a Denial of Service (DoS) via a crafted input.
Deeper analysisAI
CVE-2025-66692 is a buffer over-read vulnerability (CWE-126) in the PublicKey::verify() method of Binance - Trust Wallet Core prior to commit 5668c67. This flaw allows attackers to trigger a Denial of Service (DoS) condition through a crafted input. The vulnerability carries a CVSS v3.1 base score of 7.5, rated as High severity with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating network accessibility, low attack complexity, no privileges or user interaction required, and high impact on availability.
Remote, unauthenticated attackers can exploit this vulnerability by supplying malicious input to the affected PublicKey::verify() function, causing a buffer over-read that crashes the application and results in a DoS. No privileges, user interaction, or special access are needed, making it feasible for attackers targeting systems or applications integrating vulnerable versions of Trust Wallet Core.
Mitigation is addressed in the patching commit at https://github.com/trustwallet/wallet-core/commit/5668c67, which users should apply to versions before 5668c67. Further technical details are provided in the advisory gist at https://gist.github.com/inkman97/b791189338f73b758c31a7db3cd50c2d. The CVE was published on 2026-01-20T21:16:04.437.
Details
- CWE(s)