CVE-2026-3394

A vulnerability was detected in jarikomppa soloud up to 20200207. This affects the function SoLoud::Wav::loadwav of the file src/audiosource/wav/soloud_wav.cpp of the component WAV File Parser. Performing a manipulation results in memory corruption. The attack must be initiated from a local position. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/jarikomppa/soloud/ Product
https://github.com/jarikomppa/soloud/issues/401 Exploit Issue Tracking Vendor Advisory
https://github.com/oneafter/0209/blob/main/so2/repro Exploit
https://vuldb.com/?ctiid.348280 Permissions Required VDB Entry
https://vuldb.com/?id.348280 Third Party Advisory VDB Entry
https://vuldb.com/?submit.761339 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:solhsa:soloud:*:*:*:*:*:*:*:*

History

05 Mar 2026, 01:32

Type Values Removed Values Added
References () https://github.com/jarikomppa/soloud/ - () https://github.com/jarikomppa/soloud/ - Product
References () https://github.com/jarikomppa/soloud/issues/401 - () https://github.com/jarikomppa/soloud/issues/401 - Exploit, Issue Tracking, Vendor Advisory
References () https://github.com/oneafter/0209/blob/main/so2/repro - () https://github.com/oneafter/0209/blob/main/so2/repro - Exploit
References () https://vuldb.com/?ctiid.348280 - () https://vuldb.com/?ctiid.348280 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.348280 - () https://vuldb.com/?id.348280 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.761339 - () https://vuldb.com/?submit.761339 - Third Party Advisory, VDB Entry
First Time Solhsa soloud
Solhsa
CPE cpe:2.3:a:solhsa:soloud:*:*:*:*:*:*:*:*
Summary
  • (es) Se detectó una vulnerabilidad en jarikomppa soloud hasta 20200207, la cual afecta a la función SoLoud::Wav::loadwav del archivo src/audiosource/wav/soloud_wav.cpp del componente Analizador de archivos WAV. Su manipulación resulta en corrupción de memoria. El ataque debe iniciarse desde una posición local. El exploit ahora es público y puede ser utilizado. El proyecto fue informado del problema con antelación a través de un informe de incidencias, pero aún no ha respondido.

01 Mar 2026, 13:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-01 13:16

Updated : 2026-03-05 01:32


NVD link : CVE-2026-3394

Mitre link : CVE-2026-3394

CVE.ORG link : CVE-2026-3394


JSON object : View

Products Affected

solhsa

  • soloud
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer