Impact
The vulnerability resides in the rtsp_rely_dumps function of the cijliu librtsp library and leads to a buffer overflow. Because the overflow occurs in local memory, an attacker must have local execution privileges on the system that loads this library. The overflow can corrupt memory and may potentially allow an attacker to execute arbitrary code within the process. No remote attack vector is indicated by the description.
Affected Systems
Any installation of the cijliu librtsp library up to commit 2ec1a81ad65280568a0c7c16420d7c10fde13b04 is affected. Vendors use a rolling‑release model, so exact version numbers are not provided. Users of older or unreleased commits should check the repository for newer commits that may contain a fix, as no official patch has been issued and the vendor has not responded.
Risk and Exploitability
The CVSS score of 4.8 denotes moderate severity, and the EPSS score is reported as less than 1%, indicating a very low probability of exploitation at present. The vulnerability is not listed in the CISA KEV catalog. Given the local nature of the exploit, it is likely that only trusted users or processes running with elevated privileges could leverage this overflow. Attackers would need to execute code within a local context to achieve the overflow, making the risk profile contingent on local security controls and user privileges.
OpenCVE Enrichment