A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution.
Metrics
Affected Vendors & Products
References
History
Thu, 17 Jul 2025 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 16 Jul 2025 21:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution. | |
Title | Achat v0.150 SEH Buffer Overflow via UDP | |
Weaknesses | CWE-121 CWE-94 |
|
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: VulnCheck
Published: 2025-07-16T21:10:22.494Z
Updated: 2025-07-17T14:56:20.018Z
Reserved: 2025-04-15T19:15:22.561Z
Link: CVE-2025-34127

Updated: 2025-07-17T14:48:05.249Z

Status : Awaiting Analysis
Published: 2025-07-16T22:15:24.280
Modified: 2025-07-17T21:15:50.197
Link: CVE-2025-34127

No data.