A vulnerability classified as critical has been found in code-projects Simple Bus Reservation System 1.0. Affected is the function a::install of the component Install Bus. The manipulation of the argument bus leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/zzzxc643/cve/blob/main/Bus%20Management%20System.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.308214 | Permissions Required VDB Entry |
| https://vuldb.com/?id.308214 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.567108 | Third Party Advisory VDB Entry |
| https://github.com/zzzxc643/cve/blob/main/Bus%20Management%20System.md | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-05-10 10:15
Updated : 2025-10-23 20:06
NVD link : CVE-2025-4498
Mitre link : CVE-2025-4498
CVE.ORG link : CVE-2025-4498
JSON object : View
Products Affected
fabian
- simple_bus_reservation_system
