CVE-2025-58447

rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sending a crafted `CA_SSO_LOGIN_REQ` with an oversized token length. This leads to immediate denial of service (crash) and it is possible to achieve remote code execution via heap corruption. Commit 2f5248b fixes the issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:rathena:rathena:*:*:*:*:*:*:*:*

History

17 Sep 2025, 20:53

Type Values Removed Values Added
First Time Rathena
Rathena rathena
CPE cpe:2.3:a:rathena:rathena:*:*:*:*:*:*:*:*
CWE CWE-787
References () https://github.com/rathena/rathena/commit/2f5248b9cd9a8c6b42422ddecfc4cc2cd0e69e4b - () https://github.com/rathena/rathena/commit/2f5248b9cd9a8c6b42422ddecfc4cc2cd0e69e4b - Patch
References () https://github.com/rathena/rathena/security/advisories/GHSA-4p33-6xqr-cm6x - () https://github.com/rathena/rathena/security/advisories/GHSA-4p33-6xqr-cm6x - Vendor Advisory

09 Sep 2025, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-09-09 23:15

Updated : 2025-09-17 20:53


NVD link : CVE-2025-58447

Mitre link : CVE-2025-58447

CVE.ORG link : CVE-2025-58447


JSON object : View

Products Affected

rathena

  • rathena
CWE
CWE-122

Heap-based Buffer Overflow

CWE-787

Out-of-bounds Write