Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2025-21744 | A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution. |
Thu, 17 Jul 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 16 Jul 2025 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A stack-based buffer overflow exists in Achat v0.150 in its default configuration. By sending a specially crafted message to the UDP port 9256, an attacker can overwrite the structured exception handler (SEH) due to insufficient bounds checking on user-supplied input leading to remote code execution. | |
| Title | Achat v0.150 SEH Buffer Overflow via UDP | |
| Weaknesses | CWE-121 CWE-94 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Subscriptions
No data.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-04-07T14:09:47.085Z
Reserved: 2025-04-15T19:15:22.561Z
Link: CVE-2025-34127
Updated: 2025-07-17T14:48:05.249Z
Status : Deferred
Published: 2025-07-16T22:15:24.280
Modified: 2026-04-15T00:35:42.020
Link: CVE-2025-34127
No data.
OpenCVE Enrichment
Updated: 2026-05-12T15:45:06Z
EUVD