Unrated severityNVD Advisory· Published Sep 9, 2025· Updated Sep 10, 2025
rAthena has heap-based buffer overflow in login server
CVE-2025-58447
Description
rAthena is an open-source cross-platform massively multiplayer online role playing game (MMORPG) server. Versions prior to commit 2f5248b have a heap-based buffer overflow in the login server, remote attacker to overwrite adjacent session fields by sending a crafted CA_SSO_LOGIN_REQ with an oversized token length. This leads to immediate denial of service (crash) and it is possible to achieve remote code execution via heap corruption. Commit 2f5248b fixes the issue.
Affected products
2- rathena/rathenav5Range: < 2f5248b
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
2- github.com/rathena/rathena/commit/2f5248b9cd9a8c6b42422ddecfc4cc2cd0e69e4bmitrex_refsource_MISC
- github.com/rathena/rathena/security/advisories/GHSA-4p33-6xqr-cm6xmitrex_refsource_CONFIRM
News mentions
0No linked articles in our index yet.