Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function.
References
| Link | Resource |
|---|---|
| https://github.com/bulletphysics/bullet3/blob/master/Extras/VHACD/test/src/main_vhacd.cpp#L472 | Product |
| https://github.com/bulletphysics/bullet3/issues/4732 | Exploit Issue Tracking Third Party Advisory |
| https://github.com/bulletphysics/bullet3/issues/4732 | Exploit Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2025-08-11 05:15
Updated : 2025-12-08 18:58
NVD link : CVE-2025-8854
Mitre link : CVE-2025-8854
CVE.ORG link : CVE-2025-8854
JSON object : View
Products Affected
bulletphysics
- pybullet
