Impact
The vulnerability is a Use After Free in No-Chicken Echo-Mate. It allows an attacker to access or overwrite memory that has already been freed, potentially corrupting the program state. This memory corruption can enable arbitrary code execution or trigger a denial of service. While the description references the risk of arbitrary code execution, its impact on confidentiality, integrity, or availability is inferred rather than explicitly stated in the advisory.
Affected Systems
All releases of No-Chicken Echo-Mate prior to version V250329 are affected. Users running any of these earlier builds should consider them compromised until updated to the patched version.
Risk and Exploitability
The CVSS score of 6.4 indicates moderate severity. No EPSS data is provided, and the vulnerability is not listed in the KEV catalog, suggesting no known widespread exploitation. The attack vector is not specified in the CVE, but a Use After Free typically requires the attacker to interact with the application—either locally or remotely—depending on how Echo-Mate is deployed. It is inferred that the attacker would need to supply crafted input that triggers the free operation and then subsequently references the freed memory. No documented exploitation has been found.
OpenCVE Enrichment