A vulnerability classified as critical has been found in code-projects Simple Bus Reservation System 1.0. Affected is the function a::install of the component Install Bus. The manipulation of the argument bus leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
References
| Link | Resource |
|---|---|
| https://code-projects.org/ | Product |
| https://github.com/zzzxc643/cve/blob/main/Bus%20Management%20System.md | Exploit Third Party Advisory |
| https://vuldb.com/?ctiid.308214 | Permissions Required VDB Entry |
| https://vuldb.com/?id.308214 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.567108 | Third Party Advisory VDB Entry |
| https://github.com/zzzxc643/cve/blob/main/Bus%20Management%20System.md | Exploit Third Party Advisory |
Configurations
History
23 Oct 2025, 20:06
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Fabian
Fabian simple Bus Reservation System |
|
| CPE | cpe:2.3:a:fabian:simple_bus_reservation_system:1.0:*:*:*:*:*:*:* |
28 May 2025, 19:22
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-05-10 10:15
Updated : 2025-10-23 20:06
NVD link : CVE-2025-4498
Mitre link : CVE-2025-4498
CVE.ORG link : CVE-2025-4498
JSON object : View
Products Affected
fabian
- simple_bus_reservation_system
