


Perceptive Security
SOC/SIEM Consultancy

Snes9K 0.0.9z contains a buffer overflow vulnerability in the Netplay Socket Port Number field that allows local attackers to trigger a structured exception han…
Published:
3 april 2026 om 22:00:00
Alert date:
4 april 2026 om 15:05:07
Source:
nvd.nist.gov
Operating Systems
Snes9K version 0.0.9z contains a critical buffer overflow vulnerability in the Netplay Socket Port Number field. The vulnerability allows local attackers to trigger a structured exception handler (SEH) overwrite by crafting malicious payloads. Attackers can paste the payload into the Socket Port Number field through the Netplay Options menu. The vulnerability enables code execution through SEH chain exploitation. This represents a significant security risk for users of the affected gaming emulator software.
Technical details
Mitigation steps:
Affected products:
Snes9K
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2018-25251
https://sourceforge.net/projects/snes9k/
https://sourceforge.net/projects/snes9k/files/latest/download
https://www.exploit-db.com/exploits/45598
https://www.vulncheck.com/advisories/snes9k-9z-buffer-overflow-seh-via-netplay-socket
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
