Stack-based buffer overflow in LoadOFF in bulletphysics bullet3 before 3.26 on all platforms allows remote attackers to execute arbitrary code via a crafted OFF file with an overlong initial token processed by the VHACD test utility or invoked indirectly through PyBullet's vhacd function.
References
| Link | Resource |
|---|---|
| https://github.com/bulletphysics/bullet3/blob/master/Extras/VHACD/test/src/main_vhacd.cpp#L472 | Product |
| https://github.com/bulletphysics/bullet3/issues/4732 | Exploit Third Party Advisory Issue Tracking |
| https://github.com/bulletphysics/bullet3/issues/4732 | Exploit Third Party Advisory Issue Tracking |
Configurations
History
08 Dec 2025, 18:58
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:bulletphysics:pybullet:*:*:*:*:*:*:*:* | |
| CWE | CWE-787 | |
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 9.8 |
| First Time |
Bulletphysics
Bulletphysics pybullet |
|
| References | () https://github.com/bulletphysics/bullet3/blob/master/Extras/VHACD/test/src/main_vhacd.cpp#L472 - Product | |
| References | () https://github.com/bulletphysics/bullet3/issues/4732 - Exploit, Third Party Advisory, Issue Tracking |
11 Aug 2025, 21:15
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/bulletphysics/bullet3/issues/4732 - |
11 Aug 2025, 18:32
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
11 Aug 2025, 05:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-11 05:15
Updated : 2025-12-08 18:58
NVD link : CVE-2025-8854
Mitre link : CVE-2025-8854
CVE.ORG link : CVE-2025-8854
JSON object : View
Products Affected
bulletphysics
- pybullet
