TopVuln

High-risk vulnerability digests

CVE-2017-20225

  • CRITICAL

Details

CVSS v3
9.8
CVSS v4
9.3
NVD published
2026-03-28 12:16:01
Affected versions
TiEmu 2.08 and prior
Summary
This is a stack-based buffer overflow vulnerability in TiEmu 2.08 and earlier versions. It occurs due to inadequate boundary checks on user-supplied input, allowing attackers to execute arbitrary code with the privileges of the running application. Attackers trigger the overflow via malicious command-line arguments to the vulnerable TiEmu binary.
Remediation
No official security patch is currently available for this vulnerability, as the affected software is typically end-of-life. Organizations should restrict local access to the affected binary, and consider replacing TiEmu with a maintained alternative. If you must use the software, apply least-privilege permissions to limit the impact of potential exploitation.
Exploit info
No public exploit found yet.

View on NVD

TopVuln sends digest emails with high-risk CVE picks across multiple authoritative sources—curated with EPSS and AI. Choose daily per-stream emails and optional weekly or monthly roundups.

Subscribe — free email digest or paid plan

Information is aggregated from multiple authoritative sources for convenience; verify with NVD and vendors before operational decisions.