CVE-2025-8854

Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function.
Configurations

Configuration 1 (hide)

cpe:2.3:a:bulletphysics:pybullet:*:*:*:*:*:*:*:*

History

08 Dec 2025, 18:58

Type Values Removed Values Added
CPE cpe:2.3:a:bulletphysics:pybullet:*:*:*:*:*:*:*:*
CWE CWE-787
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Bulletphysics
Bulletphysics pybullet
References () https://github.com/bulletphysics/bullet3/blob/master/Extras/VHACD/test/src/main_vhacd.cpp#L472 - () https://github.com/bulletphysics/bullet3/blob/master/Extras/VHACD/test/src/main_vhacd.cpp#L472 - Product
References () https://github.com/bulletphysics/bullet3/issues/4732 - () https://github.com/bulletphysics/bullet3/issues/4732 - Exploit, Third Party Advisory, Issue Tracking

11 Aug 2025, 21:15

Type Values Removed Values Added
References () https://github.com/bulletphysics/bullet3/issues/4732 - () https://github.com/bulletphysics/bullet3/issues/4732 -

11 Aug 2025, 18:32

Type Values Removed Values Added
Summary
  • (es) El desbordamiento de búfer basado en pila en LoadOFF en bulletphysics bullet3 anterior a 3.26 en todas las plataformas permite a atacantes remotos ejecutar código arbitrario a través de un archivo OFF manipulado con un token inicial demasiado largo procesado por la utilidad de prueba VHACD o invocado indirectamente a través de la función vhacd de PyBullet.

11 Aug 2025, 05:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-11 05:15

Updated : 2025-12-08 18:58


NVD link : CVE-2025-8854

Mitre link : CVE-2025-8854

CVE.ORG link : CVE-2025-8854


JSON object : View

Products Affected

bulletphysics

  • pybullet
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-787

Out-of-bounds Write