Impact
A buffer overflow vulnerability exists in Yasr Screen Reader version 0.6.9-5. The flaw is triggered when an attacker supplies an oversized argument to the -p command‑line parameter. An attacker who can run the program locally may craft a payload containing junk data, shellcode, and a return address to overwrite the stack, causing the application to crash or allowing arbitrary code to be executed.
Affected Systems
The vulnerability affects only Yasr Screen Reader version 0.6.9-5. Systems running this build or earlier are at risk; newer releases are not documented as affected.
Risk and Exploitability
The CVSS score of 8.6 signifies a high severity issue. Because exploitation requires local execution and the vulnerability is not listed in CISA’s KEV catalog, exposure is limited to users who can run Yasr on the target machine. Nevertheless, once the local attacker supplies a malicious -p argument, they can achieve complete control of the application and potentially the underlying system.
OpenCVE Enrichment