Impact
The vulnerability is a stack‑based buffer overflow caused by inadequate boundary checks on user‑supplied input. It allows an attacker to execute arbitrary code within the TiEmu application context using crafted command‑line arguments. This weakness is described as CWE‑787, enabling a potential remote code execution scenario that compromises confidentiality, integrity, and availability of systems where the software runs.
Affected Systems
The affected product is TiEmu for the TI calculator platform, specifically version 2.08 and earlier releases. These versions accept command‑line arguments that are not properly validated.
Risk and Exploitability
The CVSS score of 9.3 indicates high severity, while the EPSS score of less than 1% suggests a low probability of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog. Based on the description, the likely attack vector involves supplying crafted arguments to TiEmu at launch, allowing an attacker to execute shellcode through ROP gadgets. Exploitation requires local access to the machine running TiEmu and the ability to invoke the program with malicious parameters.
OpenCVE Enrichment