Impact
A null pointer dereference exists in the RequestButton routine of Telegram Desktop’s Bot API and is triggered when an attacker supplies a malicious login_url. The flaw can be triggered remotely and causes the application to crash or terminate unexpectedly when processing the request.
Affected Systems
Telegram Desktop versions up to and including 6.7.5 are affected; the vulnerable code resides in the Bot API component within url_auth_box.cpp and runs on all supported platforms.
Risk and Exploitability
With a CVSS score of 5.3 the severity is considered medium. The exploit is publicly disclosed and can be executed remotely by sending a crafted login_url, but the EPSS score is unavailable and the vulnerability is not listed in CISA’s KEV catalog. The primary impact is a denial of service that may affect end‑user availability.
OpenCVE Enrichment