EChat Server 3.1 contains a buffer overflow vulnerability in the chat.ghp endpoint that allows remote attackers to execute arbitrary code by supplying an oversized username parameter. Attackers can send a GET request to chat.ghp with a malicious username value containing shellcode and ROP gadgets to achieve code execution in the application context.
References
| Link | Resource |
|---|---|
| https://www.exploit-db.com/exploits/44155 | Exploit |
| https://www.vulncheck.com/advisories/echat-server-buffer-overflow-via-chat-ghp-username-parameter | Third Party Advisory |
Configurations
History
02 Apr 2026, 19:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| CPE | cpe:2.3:a:echatserver:easy_chat_server:*:*:*:*:*:*:*:* | |
| First Time |
Echatserver
Echatserver easy Chat Server |
|
| References | () https://www.exploit-db.com/exploits/44155 - Exploit | |
| References | () https://www.vulncheck.com/advisories/echat-server-buffer-overflow-via-chat-ghp-username-parameter - Third Party Advisory |
28 Mar 2026, 12:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-28 12:16
Updated : 2026-04-02 19:15
NVD link : CVE-2018-25221
Mitre link : CVE-2018-25221
CVE.ORG link : CVE-2018-25221
JSON object : View
Products Affected
echatserver
- easy_chat_server
CWE
CWE-787
Out-of-bounds Write
