top of page
perceptive_background_267k.jpg

Snes9K 0.0.9z contains a buffer overflow vulnerability in the Netplay Socket Port Number field that allows local attackers to trigger a structured exception han…

Published:

3 April 2026 at 22:00:00

Alert date:

4 April 2026 at 15:05:07

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems

Snes9K version 0.0.9z contains a critical buffer overflow vulnerability in the Netplay Socket Port Number field. The vulnerability allows local attackers to trigger a structured exception handler (SEH) overwrite by crafting malicious payloads. Attackers can paste the payload into the Socket Port Number field through the Netplay Options menu. The vulnerability enables code execution through SEH chain exploitation. This represents a significant security risk for users of the affected gaming emulator software.

Technical details

Mitigation steps:

Affected products:

Snes9K

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Disclaimer: Deze website toont informatie afkomstig van externe bronnen. Perceptive aanvaardt geen verantwoordelijkheid voor de inhoud, juistheid of volledigheid van deze informatie.

bottom of page