Impact
Based on the CVE description, the vulnerability stems from incorrect boundary checking in the WebRTC networking component, which can lead to memory corruption. It is classified as CWE‑119 and CWE‑131. It is inferred that successful exploitation could potentially compromise the integrity of the browser process.
Affected Systems
Mozilla Firefox and Thunderbird browsers are affected when they use the vulnerable WebRTC module. It is inferred that all releases prior to Firefox 150 / ESR 140.10 and Thunderbird 150 / 140.10 remain exposed. Any third‑party software that embeds the same WebRTC networking code without the patch is also at risk.
Risk and Exploitability
The CVSS score of 7.8 places the vulnerability in the high‑severity range. No EPSS score is available and the issue is not listed in the CISA KEV catalog. It is inferred that the flaw can be triggered by network traffic that reaches the WebRTC component, meaning a malicious web page or remote host could send crafted data to the victim. Successful exploitation would threaten the integrity of the affected process.
OpenCVE Enrichment
Debian DSA