Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 27 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 20 Oct 2025 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:rathena:rathena:*:*:*:*:*:*:*:* |
Mon, 20 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Rathena
Rathena rathena |
|
| Vendors & Products |
Rathena
Rathena rathena |
Mon, 13 Oct 2025 18:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | rAthena is an open-source cross-platform MMORPG server. A use-after-free vulnerability exists in the RODEX functionality of rAthena's map-server in versions prior to commit af2f3ba. An unauthenticated attacker can exploit this vulnerability via a specific attacking scenario to cause a denial of service by crashing the map-server. This issue has been patched in commit af2f3ba. There are no known workarounds aside from manually applying the patch. | |
| Title | rAthena map-server use-after-free vulnerability in RODEX | |
| Weaknesses | CWE-416 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-10-27T16:11:53.120Z
Reserved: 2025-10-07T16:12:03.425Z
Link: CVE-2025-62170
Updated: 2025-10-27T16:11:49.071Z
Status : Analyzed
Published: 2025-10-13T18:15:34.980
Modified: 2025-10-20T17:25:25.287
Link: CVE-2025-62170
No data.
OpenCVE Enrichment
Updated: 2025-10-20T16:13:21Z