Gửi #758512: codeastro Food Ordering System V1.0 Stack-based Buffer Overflowthông tin

tiêu đềcodeastro Food Ordering System V1.0 Stack-based Buffer Overflow
Mô tảDuring a security assessment of the "Food Ordering System" V1.0, a critical Stack-based Buffer Overflow vulnerability was identified in the main executable `food_ordering.exe`. The vulnerability is triggered when the application requests user input. Due to the lack of boundary checks, entering a string of specific length (e.g., a long sequence of 'a's) causes a buffer overflow. Debugging analysis confirmed that the overflow corrupts the CPU registers (specifically `RDI` and `RSI` were observed to be overwritten with `0x61616161...`, the hexadecimal representation of 'aaaa') and eventually leads to an access violation when the program attempts to reference the corrupted memory addresses (e.g., during a locking operation or function return). This flaw allows a attacker to crash the program or potentially execute malicious code.
Nguồn⚠️ https://github.com/910biter/cve/issues/3
Người dùng
 RuqiZhang (UID 95589)
Đệ trình14/02/2026 18:11 (cách đây 2 các tháng)
Kiểm duyệt24/02/2026 18:29 (10 days later)
Trạng tháiđược chấp nhận
Mục VulDB347631 [CodeAstro Food Ordering System 1.0 food_ordering.exe tràn bộ đệm]
điểm20

Want to know what is going to be exploited?

We predict KEV entries!