Home

Description

A security vulnerability has been detected in LLM-Claw 0.1.0/0.1.1/0.1.1a/0.1.1a-p1. The affected element is the function agent_deploy_init of the file /agents/deploy/initiate.c of the component Agent Deployment. Such manipulation leads to buffer overflow. It is possible to launch the attack remotely. A patch should be applied to remediate this issue.

PUBLISHED Reserved 2025-10-27 | Published 2026-03-03 | Updated 2026-03-03 | Assigner VulDB




HIGH: 8.7CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:P
HIGH: 8.8CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
HIGH: 8.8CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:H/RL:O/RC:C
9.0AV:N/AC:L/Au:S/C:C/I:C/A:C/E:H/RL:OF/RC:C

Problem types

Buffer Overflow

Memory Corruption

Timeline

2026-03-03:Advisory disclosed
2026-03-03:VulDB entry created
2026-03-03:VulDB entry last update

Credits

VulDB coordinator

References

vuldb.com/?id.348531 (VDB-348531 | LLM-Claw Agent Deployment initiate.c agent_deploy_init buffer overflow) vdb-entry technical-description

vuldb.com/?ctiid.348531 (VDB-348531 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

cve.org (CVE-2025-12345)

nvd.nist.gov (CVE-2025-12345)

Download JSON