PixGPS 1.1.8 contains a buffer overflow vulnerability that allows local attackers to crash the application by supplying an oversized string to the folder path input field. Attackers can craft a payload exceeding 6000 bytes and paste it into the 'Folder with picture files' field to trigger a denial of service condition.
References
Configurations
No configuration.
History
26 Apr 2026, 22:17
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-26 22:17
Updated : 2026-04-27 18:55
NVD link : CVE-2018-25277
Mitre link : CVE-2018-25277
CVE.ORG link : CVE-2018-25277
JSON object : View
Products Affected
No product.
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
