Description
A security vulnerability has been detected in CodeAstro Food Ordering System 1.0. This affects an unknown function of the file food_ordering.exe. Such manipulation leads to stack-based buffer overflow. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used.
Published: 2026-02-25
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stack-Based Buffer Overflow
Action: Assess Impact
AI Analysis

Impact

The vulnerability exists in CodeAstro Food Ordering System version 1.0, affecting an unknown function within the food_ordering.exe executable. Triggering the flaw results in a stack-based buffer overflow, which can corrupt adjacent memory and potentially allow an attacker to alter program flow or execute arbitrary code. The official description notes that the exploit is only viable from a local environment, meaning that any user with local access to the machine running the application can attempt the attack. Presence of this flaw may lead to application crashes, loss of service, or compromise of the host upon successful exploitation.

Affected Systems

Affected vendors and products are CodeAstro’s Food Ordering System, specifically version 1.0. No other versions or editions are listed as vulnerable in the available CNA data.

Risk and Exploitability

The CVSS base score for this issue is 4.8, indicating moderate severity. The EPSS score is less than 1 percent, suggesting a low likelihood of exploitation in the wild at the time of analysis. The vulnerability is not included in the CISA KEV catalogue. The attack vector is inferred to be local, as the description explicitly states that the exploit can only be performed from a local environment. Given the lack of acknowledged remote execution capability, the impact is confined to systems with local user or process privileges. No public proof‑of‑concept exploits or zero‑day usage is reported beyond the initial disclosure.

Generated by OpenCVE AI on April 16, 2026 at 16:18 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Apply the vendor-released patch for CodeAstro Food Ordering System 1.0 once it becomes available to eliminate the buffer overflow flaw.
  • Configure the application to run with the minimum necessary privileges and enforce strict local access controls, thereby limiting the potential damage a local attacker could cause.
  • Deploy operating‑system level memory protection mechanisms such as stack canaries, ASLR, or DEP to mitigate the effects of any remaining or undiscovered buffer overflow vulnerabilities.

Generated by OpenCVE AI on April 16, 2026 at 16:18 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 25 Feb 2026 15:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-787
CPEs cpe:2.3:a:codeastro:food_ordering_system:1.0:*:*:*:*:*:*:*

Wed, 25 Feb 2026 01:00:00 +0000

Type Values Removed Values Added
Description A security vulnerability has been detected in CodeAstro Food Ordering System 1.0. This affects an unknown function of the file food_ordering.exe. Such manipulation leads to stack-based buffer overflow. The attack can only be performed from a local environment. The exploit has been disclosed publicly and may be used.
Title CodeAstro Food Ordering System food_ordering.exe stack-based overflow
First Time appeared Codeastro
Codeastro food Ordering System
Weaknesses CWE-119
CWE-121
CPEs cpe:2.3:a:codeastro:food_ordering_system:*:*:*:*:*:*:*:*
Vendors & Products Codeastro
Codeastro food Ordering System
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Codeastro Food Ordering System
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-27T17:31:16.374Z

Reserved: 2026-02-24T17:29:19.374Z

Link: CVE-2026-3137

cve-icon Vulnrichment

Updated: 2026-02-27T17:31:12.884Z

cve-icon NVD

Status : Analyzed

Published: 2026-02-25T01:16:09.537

Modified: 2026-04-29T01:00:01.613

Link: CVE-2026-3137

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-16T16:30:15Z

Weaknesses