Impact
The vulnerability is a buffer overflow caused by improper restriction of operations within the bounds of a memory buffer. Classified as CWE-119, this flaw allows an attacker to overwrite adjacent memory, potentially leading to arbitrary code execution or a denial of service. The CVSS score of 8.8 reflects the high potential impact of this weakness.
Affected Systems
The flaw affects Linkingvision Rapidvms for any version released before the fix in pull request #96. Specific version numbers are not listed, so any pre-PR-96 build is considered vulnerable. The affected product is linkingvision:rapidvms.
Risk and Exploitability
The CVSS score of 8.8 indicates a high severity, and the epidemic spread likelihood is not available, as the EPSS score is not provided. The vulnerability is not listed in the CISA KEV catalog. The likely attack vector is remote, because a buffer overflow can be triggered by an attacker sending crafted data over an exposed interface; based on the description, it is inferred that untrusted input could trigger the overflow. Consequently, systems exposing Rapidvms to untrusted traffic are at significant risk unless mitigated.
OpenCVE Enrichment