Description
TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can trigger the overflow through command-line arguments passed to the application, leveraging ROP gadgets to bypass protections and execute shellcode in the application context.
Published: 2026-03-28
Score: 9.3 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

TiEmu version 2.08 and earlier suffers from a stack-based buffer overflow caused by inadequate boundary checks on user‑supplied command‑line arguments. An attacker can craft arguments that trigger the overflow and, with the use of return‑to‑address gadgets, bypass stack protections and inject shellcode. The vulnerability permits arbitrary code execution with the privileges of the TiEmu process, potentially giving the attacker full control over the host system.

Affected Systems

The affected vendor is ticalc, producing the TiEmu calculator emulator. All releases up to and including TiEmu 2.08 are impacted. No later versions are documented as vulnerable in the supplied data.

Risk and Exploitability

The vulnerability carries a CVSS score of 9.3, indicating critical severity. An explicit EPSS score is not available, and the vulnerability is not listed in the CISA KEV catalog. The exploitation vector is inferred to be local, via command‑line arguments; remote exploitation would require another component to invoke TiEmu with crafted parameters. Given the ease of triggering the overflow, the risk of exploitation is high for any system that runs TiEmu with inputs from untrusted sources.

Generated by OpenCVE AI on March 28, 2026 at 13:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade TiEmu to the latest release that contains the vulnerability fix – if a newer version is available, install it immediately.
  • If an upgrade is not immediately possible, limit execution of TiEmu to trusted users by setting file permissions or using access‑control lists.
  • Run TiEmu in a sandboxed or containerized environment to contain any potential compromise.
  • Monitor system logs for anomalous execution of TiEmu or unexpected shellcode activity, and be prepared to investigate suspicious events.

Generated by OpenCVE AI on March 28, 2026 at 13:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 30 Mar 2026 07:15:00 +0000

Type Values Removed Values Added
First Time appeared Ticalc
Ticalc tiemu
Vendors & Products Ticalc
Ticalc tiemu

Sat, 28 Mar 2026 12:15:00 +0000

Type Values Removed Values Added
Description TiEmu 2.08 and prior contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by exploiting inadequate boundary checks on user-supplied input. Attackers can trigger the overflow through command-line arguments passed to the application, leveraging ROP gadgets to bypass protections and execute shellcode in the application context.
Title TiEmu 2.08 Stack-Based Buffer Overflow Vulnerability
Weaknesses CWE-787
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 9.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-28T11:58:09.770Z

Reserved: 2026-03-28T11:42:36.850Z

Link: CVE-2017-20225

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-03-28T12:16:01.613

Modified: 2026-03-28T12:16:01.613

Link: CVE-2017-20225

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-30T06:59:15Z

Weaknesses