A vulnerability was detected in jarikomppa soloud up to 20200207. This affects the function SoLoud::Wav::loadwav of the file src/audiosource/wav/soloud_wav.cpp of the component WAV File Parser. Performing a manipulation results in memory corruption. The attack must be initiated from a local position. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
| Link | Resource |
|---|---|
| https://github.com/jarikomppa/soloud/ | Product |
| https://github.com/jarikomppa/soloud/issues/401 | Exploit Issue Tracking Vendor Advisory |
| https://github.com/oneafter/0209/blob/main/so2/repro | Exploit |
| https://vuldb.com/?ctiid.348280 | Permissions Required VDB Entry |
| https://vuldb.com/?id.348280 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.761339 | Third Party Advisory VDB Entry |
Configurations
History
05 Mar 2026, 01:32
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/jarikomppa/soloud/ - Product | |
| References | () https://github.com/jarikomppa/soloud/issues/401 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://github.com/oneafter/0209/blob/main/so2/repro - Exploit | |
| References | () https://vuldb.com/?ctiid.348280 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.348280 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.761339 - Third Party Advisory, VDB Entry | |
| First Time |
Solhsa soloud
Solhsa |
|
| CPE | cpe:2.3:a:solhsa:soloud:*:*:*:*:*:*:*:* | |
| Summary |
|
01 Mar 2026, 13:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-03-01 13:16
Updated : 2026-03-05 01:32
NVD link : CVE-2026-3394
Mitre link : CVE-2026-3394
CVE.ORG link : CVE-2026-3394
JSON object : View
Products Affected
solhsa
- soloud
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer
