Impact
A write‑what‑where condition in version of the p2r3 Bareiron project identified by commit 8e4d40 allows an attacker to overwrite arbitrary memory locations. The vulnerability is exploitable without authentication by sending a crafted network packet, leading to arbitrary code execution within the process that runs Bareiron. The weakness maps to CWE‑123 and is classified with a CVSS base score of 9.8, indicating critical severity.
Affected Systems
The flaw is present in the Bareiron component at commit 8e4d40. No specific product version is documented in the CVE entry, but the module is typically employed in custom networking or IoT deployments. Vendor information is not supplied, and the affected code is part of an open‑source project.
Risk and Exploitability
The high CVSS score (9.8) signals a severe risk. EPSS data is not available and the vulnerability is not yet listed in the CISA KEV catalog. Exploitation requires an unauthenticated attacker to transmit a malformed packet; successful exploitation would allow the attacker to write arbitrary values to memory, giving them control over the process and potentially compromising confidentiality, integrity, and availability of the host system.
OpenCVE Enrichment