Impact
The vulnerability arises from a stack overflow detected in the Thread1 function of CentSDR, as identified within commit e40795. A stack overflow typically permits an attacker to overwrite adjacent memory locations, potentially leading to unpredictable program behavior, crashes, or, in some contexts, arbitrary code execution. The CVE data does not describe a confirmed exploitation vector or the privileges required to trigger the overflow, so the exact scope of impact remains uncertain, though local or privileged access could be sufficient if a malicious input is processed by the vulnerable function.
Affected Systems
CentSDR installations that include commit e40795 are affected. No specific vendor or version information is supplied, so any instance of this software running the vulnerable code may be at risk.
Risk and Exploitability
No EPSS or KEV metrics are available, but the CVSS score is 7.5, indicating a high level of severity. However, stack overflows are commonly considered high‑severity because they can corrupt execution flow. In the absence of explicit exploitation evidence, the likelihood of immediate attacks is uncertain but the potential for severe compromise exists if an attacker can supply crafted input or exploit the function during operation.
OpenCVE Enrichment