Impact
Crashmail 1.6 contains a stack‑based buffer overflow that lets a remote attacker send specially crafted data to the application, resulting in arbitrary code execution. The vulnerability is triggered by malformed input and can also crash the application if exploitation fails, causing denial of service.
Affected Systems
The flaw affects Crashmail version 1.6, distributed by FTNApps. Users running this release on any platform are potentially vulnerable; no other versions or products are listed as affected.
Risk and Exploitability
The issue has a CVSS score of 9.3, indicating severe impact. EPSS is below 1 percent, meaning the likelihood of an attacker successfully exploiting this flaw in the wild is low, and the vulnerability is not yet cited in the CISA KEV catalog. The attack vector is remote; attackers would need to be able to transmit data to the application over the network. Based on the description, it is inferred that the exploit requires remote network access to Crashmail’s listening service.
OpenCVE Enrichment