Impact
The vulnerability is a buffer overflow in the Server field of the Network settings of RarmaRadio. By entering a string longer than 4000 bytes through the Settings menu, a local user can trigger a crash of the application, leading to a denial of service condition. The weakness corresponds to a classic out‑of‑bounds write (CWE‑787) that compromises application integrity and availability.
Affected Systems
Affected vendors and products include Raimersoft’s RarmaRadio, specifically version 2.72.3. No other versions or vendors are listed as affected, so the impact is limited to installations running that exact build.
Risk and Exploitability
The CVSS score for this flaw is 6.9, indicating moderate severity. The EPSS score is below 1%, and the vulnerability is not currently listed in CISA’s KEV catalog, suggesting limited exploitation risk at this time. Exploitation requires local access to the device, as the attacker must use the Settings interface. Because the vector is local and the impact is an application crash, the risk is bounded to the local user or compromised machine. The overall threat level is moderate, but users should still apply remediation when available.
OpenCVE Enrichment