Inbit Messenger versions 4.6.0 to 4.9.0 contain a remote stack-based buffer overflow vulnerability that allows unauthenticated attackers to execute arbitrary code by sending malformed network packets. Attackers can craft a specially designed payload targeting the messenger's network handler to overwrite the Structured Exception Handler (SEH) and execute shellcode on vulnerable Windows systems.
References
Configurations
No configuration.
History
14 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/a-rey/exploits/blob/main/writeups/Inbit_Messenger/v4.6.0/writeup.md - |
13 Jan 2026, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-13 23:16
Updated : 2026-01-14 20:16
NVD link : CVE-2023-54330
Mitre link : CVE-2023-54330
CVE.ORG link : CVE-2023-54330
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow
