Impact
A vulnerability was identified in the pkByteBufferAddString function of ThakeeNathees pocketlang, which occurs when a caller supplies a length of 4,294,967,290. This large length value causes a buffer overflow and results in memory corruption. The weakness is a classic unbounded write, matching CWE‑119. The CVE description notes that exploitation requires local access and a public exploit exists.
Affected Systems
All versions of ThakeeNathees pocketlang up to commit cc73ca61b113d48ee130d837a7a8b145e41de5ce are potentially affected. The project does not use formal versioning, so no specific unaffected releases are identified. Consequently, any current installation should be treated as vulnerable until the upstream project releases a fix.
Risk and Exploitability
The CVSS score for this issue is 4.8, indicating medium severity, while the EPSS score is under 1%, suggesting a low chance of exploitation at present. The vulnerability is not listed in CISA's KEV catalog. Because the exploit requires local execution privileges, the risk to systems without local access is limited. However, if local access is available, memory corruption could lead to crashes, data integrity issues, or denial of service.
OpenCVE Enrichment