Buffer Overflow vulnerability in GPAC version 2.5 allows a local attacker to execute arbitrary code.
References
| Link | Resource |
|---|---|
| https://github.com/gpac/gpac/commit/74e26b8dfeb0ab8c7317603b80a18306d0698473 | Patch |
| https://github.com/gpac/gpac/issues/3089 | Exploit Issue Tracking |
| https://github.com/gpac/gpac/issues/3089 | Exploit Issue Tracking |
Configurations
History
No history.
Information
Published : 2025-02-28 23:15
Updated : 2025-09-25 13:27
NVD link : CVE-2025-25723
Mitre link : CVE-2025-25723
CVE.ORG link : CVE-2025-25723
JSON object : View
Products Affected
gpac
- gpac
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
