We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution.
Reserved 2025-04-15 | Published 2025-07-16 | Updated 2025-07-16 | Assigner VulnCheckCWE-121 Stack-based Buffer Overflow
CWE-94 Improper Control of Generation of Code ('Code Injection')
Peter Kasza
raw.githubusercontent.com/...loits/windows/misc/achat_bof.rb
www.vulncheck.com/advisories/achat-seh-buffer-overflow
www.exploit-db.com/exploits/36056
Support options