CVE-2025-8854

Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function.
CVSS

No CVSS.

Configurations

No configuration.

History

11 Aug 2025, 21:15

Type Values Removed Values Added
References () https://github.com/bulletphysics/bullet3/issues/4732 - () https://github.com/bulletphysics/bullet3/issues/4732 -

11 Aug 2025, 18:32

Type Values Removed Values Added
Summary
  • (es) El desbordamiento de búfer basado en pila en LoadOFF en bulletphysics bullet3 anterior a 3.26 en todas las plataformas permite a atacantes remotos ejecutar código arbitrario a través de un archivo OFF manipulado con un token inicial demasiado largo procesado por la utilidad de prueba VHACD o invocado indirectamente a través de la función vhacd de PyBullet.

11 Aug 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-11 05:15

Updated : 2025-08-11 21:15


NVD link : CVE-2025-8854

Mitre link : CVE-2025-8854

CVE.ORG link : CVE-2025-8854


JSON object : View

Products Affected

No product.

CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')