Cyber Posture

CVE-2025-66692

HighPublic PoC

Published: 20 January 2026

Published
20 January 2026
Modified
30 January 2026
KEV Added
Patch
CVSS Score 7.5 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score 0.0008 22.7th percentile
Risk Priority 15 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-66692 is a high-severity Buffer Over-read (CWE-126) vulnerability in Trustwallet Trust Wallet Core. Its CVSS base score is 7.5 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 22.7th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Buffer over-read in PublicKey::verify() directly enables remote unauthenticated application exploitation leading to crash/DoS (T1499.004).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

A buffer over-read in the PublicKey::verify() method of Binance - Trust Wallet Core before commit 5668c67 allows attackers to cause a Denial of Service (DoS) via a crafted input.

Deeper analysisAI

CVE-2025-66692 is a buffer over-read vulnerability (CWE-126) in the PublicKey::verify() method of Binance - Trust Wallet Core prior to commit 5668c67. This flaw allows attackers to trigger a Denial of Service (DoS) condition through a crafted input. The vulnerability carries a CVSS v3.1 base score of 7.5, rated as High severity with the vector AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H, indicating network accessibility, low attack complexity, no privileges or user interaction required, and high impact on availability.

Remote, unauthenticated attackers can exploit this vulnerability by supplying malicious input to the affected PublicKey::verify() function, causing a buffer over-read that crashes the application and results in a DoS. No privileges, user interaction, or special access are needed, making it feasible for attackers targeting systems or applications integrating vulnerable versions of Trust Wallet Core.

Mitigation is addressed in the patching commit at https://github.com/trustwallet/wallet-core/commit/5668c67, which users should apply to versions before 5668c67. Further technical details are provided in the advisory gist at https://gist.github.com/inkman97/b791189338f73b758c31a7db3cd50c2d. The CVE was published on 2026-01-20T21:16:04.437.

Details

CWE(s)

Affected Products

trustwallet
trust wallet core
≤ 4.4.0

CVEs Like This One

CVE-2025-60003Shared CWE-126
CVE-2026-20846Shared CWE-126
CVE-2026-37532Shared CWE-126
CVE-2026-21367Shared CWE-126
CVE-2026-21381Shared CWE-126
CVE-2026-3203Shared CWE-126
CVE-2025-21277Shared CWE-126
CVE-2026-4371Shared CWE-126
CVE-2025-12106Shared CWE-126
CVE-2026-28364Shared CWE-126

References