Impact
Termite 3.4 contains a buffer overflow vulnerable field in its user interface language settings. By entering an excessively long string—up to 2000 bytes—a local attacker can trigger a crash of the application. The resulting impact is loss of availability, potentially interrupting services that rely on the Termite application. The weakness is a classic buffer overflow, categorized as CWE-787.
Affected Systems
The product affected is Compuphase Termite. Version 3.4 is the specific release containing the flaw. Any deployment of this version is susceptible to the described denial‑of‑service condition.
Risk and Exploitability
With a CVSS base score of 6.9, the vulnerability is considered moderate in severity. Because the exposure is local and requires the attacker to have access to the target system’s desktop environment, the attack is likely constrained to users who can operate in the Termite UI. No EPSS score is available, preventing an assessment of current exploitation probability. The vulnerability is not listed in the CISA KEV catalog.
OpenCVE Enrichment