CVE-2025-34127: CWE-121 Stack-based Buffer Overflow in Achat Software Achat Chat Server
A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution.
CVE-2025-34127: CWE-121 Stack-based Buffer Overflow in Achat Software Achat Chat Server
Description
A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution.
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- VulnCheck
- Date Reserved
- 2025-04-15T19:15:22.561Z
- Cvss Version
- 4.0
- State
- PUBLISHED
Threat ID: 68791037a83201eaace6910b
Added to database: 7/17/2025, 3:01:11 PM
Last updated: 7/17/2025, 3:01:11 PM
Views: 1
Related Threats
CVE-2025-54066: CWE-601: URL Redirection to Untrusted Site ('Open Redirect') in DIRACGrid diracx-web
MediumCVE-2025-54061: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-54064: CWE-532: Insertion of Sensitive Information into Log File in rucio helm-charts
MediumCVE-2025-54062: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalCVE-2025-54060: CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in LabRedesCefetRJ WeGIA
CriticalActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.