Impact
A null pointer dereference was found in the utilities of the open‑source ncmdump tool, specifically in the module that handles JSON parsing with cJSON.Cpp. When malformed or specially crafted input reaches this module, the program attempts to read through a null pointer, causing it to crash. The flaw can lead to a denial of service for users relying on ncmdump but does not provide any code execution or data exfiltration capability. The weakness is classified as CWE‑476.
Affected Systems
The vendor is taurusxin, and the affected product is the ncmdump utility. All releases of ncmdump prior to version 1.4.0 contain the vulnerable code path. The tool is often used by network analysts and automation scripts to decode packet capture data, so any deployment that routinely processes external data could be impacted.
Risk and Exploitability
The CVSS score is 5.2, indicating a moderate severity. No EPSS score is published and the vulnerability is not listed in the CISA KEV catalog, suggesting limited public exploitation data. An attacker would need to run the ncmdump binary and supply crafted input that triggers the unsafe JSON parsing; therefore the attack vector is local or requires the tool to process untrusted packets. While it cannot enable remote code execution, repeated crashes could disrupt automated workflows or deny service to users.
OpenCVE Enrichment