Impact
The vulnerability is a stack‑based buffer overflow in TiEmu’s ROM parameter handling. A local attacker can supply an oversized ROM parameter through the command‑line interface, overflowing the stack buffer and overwriting the instruction pointer. This can cause a crash or lead to arbitrary code execution.
Affected Systems
The affected product is TiEmu 3.03‑nogdb+dfsg‑3, a Texas Instrument Emulator released by the ticalc community. No other versions are listed, so only this specific build is vulnerable.
Risk and Exploitability
The CVSS score of 8.6 indicates high severity, and the vulnerability is not listed in the CISA KEV catalog. EPSS data is unavailable. The exploit is local, requiring access to the command line, but it can result in arbitrary code execution or denial of service, posing a substantial risk if used in shared or untrusted environments.
OpenCVE Enrichment