Impact
A stack overflow occurs when Freeciv21 processes specially‑crafted packets before version 3.1.1, causing the server or client to crash. An attacker can trigger this from any networked connection without authentication, leading to abrupt termination of the game or server. The vulnerability is classified as a buffer overread/call stack corruption.
Affected Systems
The issue affects the Freeciv21 open‑source turn‑based strategy game, specifically any installation using a version earlier than 3.1.1. Public servers running this software are vulnerable; servers running only locally or restricted to the current user are not impacted.
Risk and Exploitability
The CVSS score of 7.5 signifies high severity, while no EPSS data is available and the vulnerability is not listed in the CISA KEV catalog. Because the flaw can be triggered remotely without authentication and relies on network packet manipulation, the likelihood of exploitation remains significant, especially for publicly exposed gaming servers.
OpenCVE Enrichment
Debian DSA