Metrics
Affected Vendors & Products
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 17 Sep 2025 21:00:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:rathena:rathena:*:*:*:*:*:*:*:* | 
Fri, 12 Sep 2025 09:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| First Time appeared | Rathena Rathena rathena | |
| Vendors & Products | Rathena Rathena rathena | 
Wed, 10 Sep 2025 20:15:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Metrics | ssvc 
 | 
Tue, 09 Sep 2025 22:30:00 +0000
| Type | Values Removed | Values Added | 
|---|---|---|
| Description | rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sending a crafted `CA_SSO_LOGIN_REQ` with an oversized token length. This leads to immediate denial of service (crash) and it is possible to achieve remote code execution via heap corruption. Commit 2f5248b fixes the issue. | |
| Title | rAthena has heap-based buffer overflow in login server | |
| Weaknesses | CWE-122 | |
| References |  | |
| Metrics | cvssV3_1 
 | 
 MITRE
                        MITRE
                    Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-10T19:30:07.516Z
Reserved: 2025-09-01T20:03:06.533Z
Link: CVE-2025-58447
 Vulnrichment
                        Vulnrichment
                    Updated: 2025-09-10T19:30:03.478Z
 NVD
                        NVD
                    Status : Analyzed
Published: 2025-09-09T23:15:36.497
Modified: 2025-09-17T20:53:21.610
Link: CVE-2025-58447
 Redhat
                        Redhat
                    No data.
 OpenCVE Enrichment
                        OpenCVE Enrichment
                    Updated: 2025-09-12T09:11:40Z