CVE-2017-20225 - Vulnerability Analysis
CriticalCVSS: 9.8Last Updated: March 30, 2026
TiEmu - Remote Code Execution
Overview
TiEmu <= 2.08 contains a buffer overflow caused by inadequate boundary checks on user-supplied command-line arguments, letting attackers execute arbitrary code via ROP gadgets, exploit requires attacker to provide crafted command-line input.
Severity & Score
Impact
Attackers can execute arbitrary code remotely, potentially leading to full system compromise.
Mitigation
Update to the latest version of TiEmu.
References
Social Media Activity(1 post)
🔴 New security advisory: CVE-2017-20225 affects multiple systems. • Impact: Remote code execution or complete system compromise possible • Risk: Attackers can gain full control of affected systems • Mitigation: Patch immediately or isolate affected systems Full breakdown: https://www.yazoul.net/advisory/cve/cve-2017-20225-tiemu-stack-buffer-overflow #Cybersecurity #SecurityPatching #HackerNews
View original postRelated Resources
Details
- CVE ID
- CVE-2017-20225
- Severity
- Critical
- CVSS Score
- 9.8
- Type
- buffer_overflow
- Status
- unconfirmed
- EPSS
- 6.8%
- Social Posts
- 1
CWE
- CWE-787
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H