CVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC
A weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the function opencc::MaxMatchSegmentation of the file src/MaxMatchSegmentation.cpp. This manipulation causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. Patch name: 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is recommended to deploy a patch.
AI Analysis
Technical Summary
CVE-2025-15536 is a heap-based buffer overflow vulnerability identified in the opencc::MaxMatchSegmentation function within the src/MaxMatchSegmentation.cpp file of BYVoid OpenCC versions 1.1.0 through 1.1.9. OpenCC is an open-source library widely used for Chinese text conversion and segmentation. The vulnerability arises from improper handling of input data that leads to writing beyond allocated heap memory boundaries, causing memory corruption. This flaw can be exploited by a local attacker with limited privileges (PR:L) without requiring user interaction (UI:N) or elevated authentication (AT:N). The attacker can manipulate inputs to trigger the overflow, potentially resulting in denial of service (application crashes) or, in some cases, arbitrary code execution if further exploitation is possible. The vulnerability has a CVSS 4.8 score, reflecting medium severity due to its local attack vector and limited scope of impact. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The patch identified by commit 345c9a50ab07018f1b4439776bad78a0d40778ec addresses this issue by correcting the buffer management in the affected function. Given OpenCC's role in language processing, this vulnerability primarily threatens systems running OpenCC locally, especially in environments processing Chinese text data.
Potential Impact
The primary impact of CVE-2025-15536 is the potential for local attackers to cause heap memory corruption, which can lead to application crashes or potentially arbitrary code execution. For organizations, this could result in denial of service conditions on systems running OpenCC, disrupting services that rely on text conversion or segmentation. In scenarios where attackers can escalate privileges or execute code, this could lead to broader system compromise. Since the vulnerability requires local access with some privileges, the risk is mitigated somewhat by access controls, but insider threats or compromised accounts could exploit it. The public availability of exploit code increases the likelihood of exploitation attempts. Organizations using OpenCC in critical language processing pipelines, especially in sectors like government, finance, or telecommunications in East Asia, could face operational disruptions or data integrity issues if exploited. The vulnerability does not affect remote attackers directly, limiting its impact scope but still posing a significant risk in multi-user or shared environments.
Mitigation Recommendations
To mitigate CVE-2025-15536, organizations should immediately apply the official patch identified by commit 345c9a50ab07018f1b4439776bad78a0d40778ec to all affected OpenCC installations. Beyond patching, restrict local access to systems running OpenCC to trusted users only, employing strict access controls and monitoring for unusual local activity. Employ application whitelisting and runtime protections to detect and prevent exploitation attempts. Conduct regular code audits and fuzz testing on text processing components to identify similar vulnerabilities proactively. Where possible, run OpenCC processes with the least privileges necessary to limit the impact of potential exploitation. Additionally, maintain up-to-date backups and incident response plans to recover quickly from any exploitation-induced disruptions. Network segmentation can also help isolate vulnerable systems from critical infrastructure. Finally, educate local users and administrators about the risks of executing untrusted code or scripts that might trigger the vulnerability.
Affected Countries
China, Japan, South Korea, Taiwan, Singapore, United States, Canada, Australia, Malaysia, Hong Kong
CVE-2025-15536: Heap-based Buffer Overflow in BYVoid OpenCC
Description
A weakness has been identified in BYVoid OpenCC up to 1.1.9. This vulnerability affects the function opencc::MaxMatchSegmentation of the file src/MaxMatchSegmentation.cpp. This manipulation causes heap-based buffer overflow. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. Patch name: 345c9a50ab07018f1b4439776bad78a0d40778ec. To fix this issue, it is recommended to deploy a patch.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2025-15536 is a heap-based buffer overflow vulnerability identified in the opencc::MaxMatchSegmentation function within the src/MaxMatchSegmentation.cpp file of BYVoid OpenCC versions 1.1.0 through 1.1.9. OpenCC is an open-source library widely used for Chinese text conversion and segmentation. The vulnerability arises from improper handling of input data that leads to writing beyond allocated heap memory boundaries, causing memory corruption. This flaw can be exploited by a local attacker with limited privileges (PR:L) without requiring user interaction (UI:N) or elevated authentication (AT:N). The attacker can manipulate inputs to trigger the overflow, potentially resulting in denial of service (application crashes) or, in some cases, arbitrary code execution if further exploitation is possible. The vulnerability has a CVSS 4.8 score, reflecting medium severity due to its local attack vector and limited scope of impact. The exploit code has been publicly disclosed, increasing the risk of exploitation, although no active exploitation in the wild has been reported yet. The patch identified by commit 345c9a50ab07018f1b4439776bad78a0d40778ec addresses this issue by correcting the buffer management in the affected function. Given OpenCC's role in language processing, this vulnerability primarily threatens systems running OpenCC locally, especially in environments processing Chinese text data.
Potential Impact
The primary impact of CVE-2025-15536 is the potential for local attackers to cause heap memory corruption, which can lead to application crashes or potentially arbitrary code execution. For organizations, this could result in denial of service conditions on systems running OpenCC, disrupting services that rely on text conversion or segmentation. In scenarios where attackers can escalate privileges or execute code, this could lead to broader system compromise. Since the vulnerability requires local access with some privileges, the risk is mitigated somewhat by access controls, but insider threats or compromised accounts could exploit it. The public availability of exploit code increases the likelihood of exploitation attempts. Organizations using OpenCC in critical language processing pipelines, especially in sectors like government, finance, or telecommunications in East Asia, could face operational disruptions or data integrity issues if exploited. The vulnerability does not affect remote attackers directly, limiting its impact scope but still posing a significant risk in multi-user or shared environments.
Mitigation Recommendations
To mitigate CVE-2025-15536, organizations should immediately apply the official patch identified by commit 345c9a50ab07018f1b4439776bad78a0d40778ec to all affected OpenCC installations. Beyond patching, restrict local access to systems running OpenCC to trusted users only, employing strict access controls and monitoring for unusual local activity. Employ application whitelisting and runtime protections to detect and prevent exploitation attempts. Conduct regular code audits and fuzz testing on text processing components to identify similar vulnerabilities proactively. Where possible, run OpenCC processes with the least privileges necessary to limit the impact of potential exploitation. Additionally, maintain up-to-date backups and incident response plans to recover quickly from any exploitation-induced disruptions. Network segmentation can also help isolate vulnerable systems from critical infrastructure. Finally, educate local users and administrators about the risks of executing untrusted code or scripts that might trigger the vulnerability.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- VulDB
- Date Reserved
- 2026-01-17T16:27:11.665Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 696ca3d1d302b072d9b4cb87
Added to database: 1/18/2026, 9:11:45 AM
Last enriched: 2/23/2026, 10:42:57 PM
Last updated: 3/25/2026, 10:43:29 AM
Views: 101
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.