← Back to CVEs
CVE-2018-25251
HIGH8.4
Description
Snes9K 0.0.9z contains a buffer overflow vulnerability in the Netplay Socket Port Number field that allows local attackers to trigger a structured exception handler (SEH) overwrite. Attackers can craft a malicious payload and paste it into the Socket Port Number field via the Netplay Options menu to achieve code execution through SEH chain exploitation.
CVE Details
CVSS v3.1 Score8.4
SeverityHIGH
CVSS VectorCVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack VectorLOCAL
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published4/4/2026
Last Modified4/4/2026
Sourcenvd
Honeypot Sightings0
Weaknesses (CWE)
CWE-787
References
https://sourceforge.net/projects/snes9k/(disclosure@vulncheck.com)
https://sourceforge.net/projects/snes9k/files/latest/download(disclosure@vulncheck.com)
https://www.exploit-db.com/exploits/45598(disclosure@vulncheck.com)
https://www.vulncheck.com/advisories/snes9k-9z-buffer-overflow-seh-via-netplay-socket(disclosure@vulncheck.com)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.