We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-34127

Achat v0.150 SEH Buffer Overflow via UDP



Description

A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution.

Reserved 2025-04-15 | Published 2025-07-16 | Updated 2025-07-16 | Assigner VulnCheck


CRITICAL: 9.3CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

CWE-94 Improper Control of Generation of Code ('Code Injection')

Product status

Default status
unknown

0.150
affected

Credits

Peter Kasza finder

References

raw.githubusercontent.com/...loits/windows/misc/achat_bof.rb exploit

www.vulncheck.com/advisories/achat-seh-buffer-overflow third-party-advisory

www.exploit-db.com/exploits/36056 exploit

cve.org (CVE-2025-34127)

nvd.nist.gov (CVE-2025-34127)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-34127

Support options

Helpdesk Chat, Email, Knowledgebase