Impact
A maliciously crafted project directory can trick Autodesk 3ds Max into executing code when a .max file is opened. The vulnerability arises from an untrusted search path that permits the program to load executables from directories controlled by the project, enabling arbitrary code to run with the same privileges as the user. This flaw is categorized as CWE‑426.
Affected Systems
The affected product is Autodesk 3ds Max, specifically version 2026 as indicated in the referenced CPEs. Earlier releases may also be impacted if they employ similar loading mechanisms; however, only 2026 is explicitly noted.
Risk and Exploitability
The CVSS score of 7.8 reflects high severity, while the EPSS score of less than 1% indicates very low current exploitation likelihood. The vulnerability is not listed in the CISA KEV catalog. Attacks would require a user to open a malicious .max file or otherwise supply a crafted project directory; thus the vector is expected to be local or user‑initiated without remote code execution from a network source.
OpenCVE Enrichment