Impact
A buffer overrun in the WebRTC component of Google Chrome allows a remote attacker to craft an HTML page that, when rendered, causes an out‑of‑bounds write. This overflow can lead to arbitrary code execution inside the browser’s sandbox, potentially compromising the user’s system and data.
Affected Systems
Google Chrome versions prior to 148.0.7778.168 are affected. The vulnerability is present in the Chrome browser, as listed by the CNA, with no other vendor or product currently included in the report.
Risk and Exploitability
The CVSS score is 8.8, but the Chromium severity is marked high and the exploit is limited to a crafted HTML page viewed in the browser. No EPSS score is available and the vulnerability is not cataloged in CISA’s KEV. Because the attack vector requires a user to open a malicious page, the likelihood depends on phishing or social engineering context, but the impact remains severe if exploited.
OpenCVE Enrichment
Debian DSA