Home

Description

rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sending a crafted `CA_SSO_LOGIN_REQ` with an oversized token length. This leads to immediate denial of service (crash) and it is possible to achieve remote code execution via heap corruption. Commit 2f5248b fixes the issue.

PUBLISHED Reserved 2025-09-01 | Published 2025-09-09 | Updated 2025-09-10 | Assigner GitHub_M




CRITICAL: 9.8CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

CWE-122: Heap-based Buffer Overflow

Product status

< 2f5248b
affected

References

github.com/...athena/security/advisories/GHSA-4p33-6xqr-cm6x

github.com/...ommit/2f5248b9cd9a8c6b42422ddecfc4cc2cd0e69e4b

cve.org (CVE-2025-58447)

nvd.nist.gov (CVE-2025-58447)

Download JSON