Impact
The vulnerability exists in CodeAstro Food Ordering System version 1.0, affecting an unknown function within the food_ordering.exe executable. Triggering the flaw results in a stack-based buffer overflow, which can corrupt adjacent memory and potentially allow an attacker to alter program flow or execute arbitrary code. The official description notes that the exploit is only viable from a local environment, meaning that any user with local access to the machine running the application can attempt the attack. Presence of this flaw may lead to application crashes, loss of service, or compromise of the host upon successful exploitation.
Affected Systems
Affected vendors and products are CodeAstro’s Food Ordering System, specifically version 1.0. No other versions or editions are listed as vulnerable in the available CNA data.
Risk and Exploitability
The CVSS base score for this issue is 4.8, indicating moderate severity. The EPSS score is less than 1 percent, suggesting a low likelihood of exploitation in the wild at the time of analysis. The vulnerability is not included in the CISA KEV catalogue. The attack vector is inferred to be local, as the description explicitly states that the exploit can only be performed from a local environment. Given the lack of acknowledged remote execution capability, the impact is confined to systems with local user or process privileges. No public proof‑of‑concept exploits or zero‑day usage is reported beyond the initial disclosure.
OpenCVE Enrichment