CVE-2025-4498

A vulnerability classified as critical has been found in code-projects Simple Bus Reservation System 1.0. Affected is the function a::install of the component Install Bus. The manipulation of the argument bus leads to stack-based buffer overflow. It is possible to launch the attack on the local host. The exploit has been disclosed to the public and may be used.
References
Link Resource
https://code-projects.org/ Product
https://github.com/zzzxc643/cve/blob/main/Bus%20Management%20System.md Exploit Third Party Advisory
https://vuldb.com/?ctiid.308214 Permissions Required VDB Entry
https://vuldb.com/?id.308214 Third Party Advisory VDB Entry
https://vuldb.com/?submit.567108 Third Party Advisory VDB Entry
https://github.com/zzzxc643/cve/blob/main/Bus%20Management%20System.md Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:fabianros:simple_bus_reservation_system:1.0:*:*:*:*:*:*:*

History

28 May 2025, 19:22

Type Values Removed Values Added
New CVE

Information

Published : 2025-05-10 10:15

Updated : 2025-05-28 19:22


NVD link : CVE-2025-4498

Mitre link : CVE-2025-4498

CVE.ORG link : CVE-2025-4498


JSON object : View

Products Affected

fabianros

  • simple_bus_reservation_system
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write