First published: Sun May 18 2025(Updated: )
A vulnerability was found in code-projects Tourism Management System 1.0 and classified as critical. This issue affects the function LoginUser of the component Login User. The manipulation of the argument username/password leads to stack-based buffer overflow. Attacking locally is a requirement. The exploit has been disclosed to the public and may be used.
Credit: cna@vuldb.com
Affected Software | Affected Version | How to fix |
---|---|---|
Tourism Management System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-4890 is classified as a critical vulnerability due to its potential for a stack-based buffer overflow.
To fix CVE-2025-4890, developers should validate user input and implement proper bounds checking in the LoginUser function to prevent buffer overflow.
CVE-2025-4890 affects the Login User component of the Tourism Management System 1.0.
CVE-2025-4890 primarily requires local access for exploitation, making it critical to restrict access to authorized users.
Exploitation of CVE-2025-4890 can result in arbitrary code execution and compromise system integrity.