Impact
The flaw originates in libtomcrypt v1.18.1 or earlier, which is bundled with Net::Dropbear Perl modules prior to 0.14. A memory corruption vulnerability (CWE-1395) in this library can allow an attacker to overwrite memory and potentially execute arbitrary code.
Affected Systems
All ATRODO Net::Dropbear installations using version 0.13 or earlier, including releases that ship Dropbear 2019.78 or earlier, are affected. These Perl modules embed the vulnerable libtomcrypt and therefore expose the weakness across the systems that rely on them.
Risk and Exploitability
No EPSS score or KEV listing is available, indicating limited publicly known exploitation data; however, the underlying memory corruption could be leveraged if an attacker can supply crafted input or has local access. The CVSS score of 10 indicates a critical level of risk, so administrators should treat the vulnerability as a high‑risk concern and prioritize remediation.
OpenCVE Enrichment