rAthena is an open-source cross-platform MMORPG server. A use-after-free vulnerability exists in the RODEX functionality of rAthena's map-server in versions prior to commit af2f3ba. An unauthenticated attacker can exploit this vulnerability via a specific attacking scenario to cause a denial of service by crashing the map-server. This issue has been patched in commit af2f3ba. There are no known workarounds aside from manually applying the patch.
References
Configurations
History
20 Oct 2025, 17:25
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/rathena/rathena/commit/af2f3ba33fc03dc6dd510f8cfe84cd9185af748d - Patch | |
| References | () https://github.com/rathena/rathena/security/advisories/GHSA-9mj9-8vgv-r92j - Vendor Advisory | |
| CPE | cpe:2.3:a:rathena:rathena:*:*:*:*:*:*:*:* | |
| First Time |
Rathena rathena
Rathena |
13 Oct 2025, 18:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-10-13 18:15
Updated : 2025-10-20 17:25
NVD link : CVE-2025-62170
Mitre link : CVE-2025-62170
CVE.ORG link : CVE-2025-62170
JSON object : View
Products Affected
rathena
- rathena
CWE
CWE-416
Use After Free
