Impact
TiEmu version 2.08 and earlier suffers from a stack-based buffer overflow caused by inadequate boundary checks on user‑supplied command‑line arguments. An attacker can craft arguments that trigger the overflow and, with the use of return‑to‑address gadgets, bypass stack protections and inject shellcode. The vulnerability permits arbitrary code execution with the privileges of the TiEmu process, potentially giving the attacker full control over the host system.
Affected Systems
The affected vendor is ticalc, producing the TiEmu calculator emulator. All releases up to and including TiEmu 2.08 are impacted. No later versions are documented as vulnerable in the supplied data.
Risk and Exploitability
The vulnerability carries a CVSS score of 9.3, indicating critical severity. An explicit EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The exploitation vector is inferred to be local, via command‑line arguments; remote exploitation would require another component to invoke TiEmu with crafted parameters. Given the ease of triggering the overflow, the risk of exploitation is high for any system that runs TiEmu with inputs from untrusted sources.
OpenCVE Enrichment