A vulnerability was found in oatpp Oat++ up to 1.3.1. It has been declared as critical. This vulnerability affects the function deserializeArray of the file src/oatpp/json/Deserializer.cpp. The manipulation leads to stack-based buffer overflow. The attack can be initiated remotely. The exploit has been disclosed to the public and may be used.
References
Link | Resource |
---|---|
https://github.com/oatpp/oatpp/issues/1037 | Exploit Issue Tracking |
https://github.com/user-attachments/files/19579448/oatpp_crash.txt | Exploit |
https://vuldb.com/?ctiid.313738 | Permissions Required VDB Entry |
https://vuldb.com/?id.313738 | Third Party Advisory VDB Entry |
https://vuldb.com/?submit.597453 | Third Party Advisory VDB Entry |
https://github.com/oatpp/oatpp/issues/1037 | Exploit Issue Tracking |
Configurations
History
01 Oct 2025, 19:45
Type | Values Removed | Values Added |
---|---|---|
First Time |
Oatpp
Oatpp oat\+\+ |
|
CPE | cpe:2.3:a:oatpp:oat\+\+:*:*:*:*:*:*:*:* | |
CWE | CWE-787 | |
References | () https://github.com/oatpp/oatpp/issues/1037 - Exploit, Issue Tracking | |
References | () https://github.com/user-attachments/files/19579448/oatpp_crash.txt - Exploit | |
References | () https://vuldb.com/?ctiid.313738 - Permissions Required, VDB Entry | |
References | () https://vuldb.com/?id.313738 - Third Party Advisory, VDB Entry | |
References | () https://vuldb.com/?submit.597453 - Third Party Advisory, VDB Entry |
26 Jun 2025, 18:58
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-06-24 13:15
Updated : 2025-10-01 19:45
NVD link : CVE-2025-6566
Mitre link : CVE-2025-6566
CVE.ORG link : CVE-2025-6566
JSON object : View
Products Affected
oatpp
- oat\+\+