LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2017-20225

CVE-2017-20225 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: March 30, 2026

TiEmu - Remote Code Execution

Published: March 28, 2026Updated: March 30, 2026Remote Exploitable

Overview

TiEmu <= 2.08 contains a buffer overflow caused by inadequate boundary checks on user-supplied command-line arguments, letting attackers execute arbitrary code via ROP gadgets, exploit requires attacker to provide crafted command-line input.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 6.8%(Probability of exploitation in next 30 days)

Impact

Attackers can execute arbitrary code remotely, potentially leading to full system compromise.

Mitigation

Update to the latest version of TiEmu.

Social Media Activity(1 post)

Yazoul - Cybersecurity Alerts
Yazoul - Cybersecurity Alerts
@Matchbook3469
Mar 29, 2026

🔴 New security advisory: CVE-2017-20225 affects multiple systems. • Impact: Remote code execution or complete system compromise possible • Risk: Attackers can gain full control of affected systems • Mitigation: Patch immediately or isolate affected systems Full breakdown: https://www.yazoul.net/advisory/cve/cve-2017-20225-tiemu-stack-buffer-overflow #Cybersecurity #SecurityPatching #HackerNews

View original post

Details

CVE ID
CVE-2017-20225
Severity
Critical
CVSS Score
9.8
Type
buffer_overflow
Status
unconfirmed
EPSS
6.8%
Social Posts
1

CWE

  • CWE-787

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

6.8%Probability of exploitation in the next 30 days