Impact
A stack‑based buffer overflow exists in Achat v0.150. The overflow occurs when an attacker sends a specially crafted message to the default UDP port 9256, causing the structured exception handler (SEH) to be overwritten due to inadequate bounds checking. This flaw permits remote code execution, allowing an attacker to run arbitrary code in the context of the running service or the operating system.
Affected Systems
The vulnerability affects the Achat Chat Server produced by Achat Software. The affected releases include version 0.150 and any builds that retain the default configuration without the overflow fix.
Risk and Exploitability
The CVSS score of 9.3 indicates high severity, and the EPSS score of 56% shows that exploitation is considered likely. The vulnerability is not listed in CISA KEV but is already documented in exploit databases. An attacker can trigger the bug by sending a crafted UDP packet to port 9256, overriding SEH and executing code remotely on the host.
OpenCVE Enrichment
EUVD