Impact
A buffer copy without checking the size of input in the inflate.C module of AzerothCore WotLK allows a heap‑based out‑of‑bounds write. The overflow can corrupt adjacent memory, which could be leveraged to execute arbitrary code or cause a crash, thereby compromising confidentiality, integrity, or availability of the application.
Affected Systems
AzerothCore WotLK, any build through version 4.0.0.
Risk and Exploitability
The CVSS score of 10 indicates a critical severity, but the EPSS score of less than 1% suggests that the likelihood of exploitation remains low at present. It has not been listed in the CISA KEV catalog. The most probable attack vector involves a malicious compressed data stream processed by the vulnerable inflate function, which could be sent remotely to a server running the affected build.
OpenCVE Enrichment