Submit #567110: HOTEL_MANAGEMENT_SYSTEM stack overflow in edit function v1.0 Buffer Overflowinfo

TitleHOTEL_MANAGEMENT_SYSTEM stack overflow in edit function v1.0 Buffer Overflow
DescriptionThe `edit()` function contains **two critical buffer overflow vulnerabilities** due to unsafe usage of: 1. `scanf("%[^\n]", roomnumber)` (no length restriction) 2. `gets(s.roomnumber)` (deprecated and highly unsafe) An attacker can exploit these to **overwrite adjacent memory**, leading to **arbitrary code execution (RCE)** or **program crash (DoS)**.
Source⚠️ https://github.com/zzzxc643/cve/blob/main/HOTEL_MANAGEMENT_SYSTEM.md
User
 zzzxc (UID 81185)
Submission04/29/2025 07:25 AM (1 month ago)
Moderation05/09/2025 02:44 PM (10 days later)
StatusAccepted
VulDB Entry308216 [code-projects Hotel Management System 1.0 Edit Room edit roomnumber stack-based overflow]
Points19

Do you know our Splunk app?

Download it now for free!