Critical severity9.8NVD Advisory· Published Mar 28, 2026· Updated Apr 2, 2026
CVE-2018-25220
CVE-2018-25220
Description
Bochs 2.6-5 contains a stack-based buffer overflow vulnerability that allows attackers to execute arbitrary code by supplying an oversized input string to the application. Attackers can craft a malicious payload with 1200 bytes of padding followed by a return-oriented programming chain to overwrite the instruction pointer and execute shell commands with application privileges.
Affected products
1- cpe:2.3:a:bochs_project:bochs:2.6.5:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
3- www.exploit-db.com/exploits/43979nvdExploitVDB Entry
- www.vulncheck.com/advisories/bochs-5-buffer-overflow-remote-code-executionnvdThird Party Advisory
- bochs.sourceforge.netnvdProduct
News mentions
0No linked articles in our index yet.