First published: Sat May 10 2025(Updated: )
A vulnerability classified as critical has been found in code-projects Simple Bus Reservation System 1.0. Affected is the function a::install of the component Install Bus. The manipulation of the argument bus leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
code-projects Simple Bus Reservation System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4498 is classified as critical due to the stack-based buffer overflow vulnerability.
To fix CVE-2025-4498, you should update the Simple Bus Reservation System to the latest version that addresses this vulnerability.
CVE-2025-4498 affects the 'Install Bus' component and specifically the a::install function.
The vulnerability can be exploited to execute arbitrary code through a stack-based buffer overflow.
CVE-2025-4498 affects the Simple Bus Reservation System 1.0 by code-projects.