CVE-2026-3394

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to corrupt memory by manipulating WAV files processed by the SoLoud audio library, potentially leading to crashes or arbitrary code execution. However, the attack can only be carried out locally, meaning the attacker needs access to the system where the vulnerable software is running.

Technical Description

A vulnerability was detected in jarikomppa soloud up to 20200207. This affects the function SoLoud::Wav::loadwav of the file src/audiosource/wav/soloud_wav.cpp of the component WAV File Parser. Performing a manipulation results in memory corruption. The attack must be initiated from a local position. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$638($500-$1K)
Vendor Response
Grade APatched in 3 days

Quick Information

Published

Mar 1, 2026

about 1 month ago

Last Modified

Mar 5, 2026

about 1 month ago

Vendor

solhsa

Product

soloud