Логотип exploitDog
bind:CVE-2025-34127
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2025-34127

Количество 2

Количество 2

nvd логотип

CVE-2025-34127

7 месяцев назад

A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution.

EPSS: Средний
github логотип

GHSA-pfrw-7rxm-j92h

7 месяцев назад

A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution.

EPSS: Средний

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2025-34127

A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution.

52%
Средний
7 месяцев назад
github логотип
GHSA-pfrw-7rxm-j92h

A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution.

52%
Средний
7 месяцев назад

Уязвимостей на страницу