rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sending a crafted `CA_SSO_LOGIN_REQ` with an oversized token length. This leads to immediate denial of service (crash) and it is possible to achieve remote code execution via heap corruption. Commit 2f5248b fixes the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 12 Sep 2025 09:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Rathena
Rathena rathena |
|
Vendors & Products |
Rathena
Rathena rathena |
Wed, 10 Sep 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Tue, 09 Sep 2025 22:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sending a crafted `CA_SSO_LOGIN_REQ` with an oversized token length. This leads to immediate denial of service (crash) and it is possible to achieve remote code execution via heap corruption. Commit 2f5248b fixes the issue. | |
Title | rAthena has heap-based buffer overflow in login server | |
Weaknesses | CWE-122 | |
References |
| |
Metrics |
cvssV3_1
|

Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2025-09-10T19:30:07.516Z
Reserved: 2025-09-01T20:03:06.533Z
Link: CVE-2025-58447

Updated: 2025-09-10T19:30:03.478Z

Status : Awaiting Analysis
Published: 2025-09-09T23:15:36.497
Modified: 2025-09-11T17:14:10.147
Link: CVE-2025-58447

No data.