A security vulnerability has been detected in jarikomppa soloud up to 20200207. The impacted element is the function SoLoud::Wav::loadflac of the file src/audiosource/wav/soloud_wav.cpp of the component Audio File Handler. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/jarikomppa/soloud/ | Product |
| https://github.com/jarikomppa/soloud/issues/401 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/oneafter/0209/blob/main/so1/repro | Exploit |
| https://vuldb.com/?ctiid.348279 | Permissions Required VDB Entry |
| https://vuldb.com/?id.348279 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.761338 | Third Party Advisory VDB Entry |
Configurations
History
13 Mar 2026, 14:23
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References | () https://github.com/jarikomppa/soloud/ - Product | |
| References | () https://github.com/jarikomppa/soloud/issues/401 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/oneafter/0209/blob/main/so1/repro - Exploit | |
| References | () https://vuldb.com/?ctiid.348279 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.348279 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.761338 - Third Party Advisory, VDB Entry | |
| CPE | cpe:2.3:a:solhsa:soloud:*:*:*:*:*:*:*:* | |
| First Time |
Solhsa soloud
Solhsa |
01 Mar 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-01 13:16
Updated : 2026-03-13 14:23
NVD link : CVE-2026-3393
Mitre link : CVE-2026-3393
CVE.ORG link : CVE-2026-3393
JSON object : View
Products Affected
solhsa
- soloud
