top of page
perceptive_background_267k.jpg

Snes9K 0.0.9z contains a buffer overflow vulnerability in the Netplay Socket Port Number field that allows local attackers to trigger a structured exception han…

Published:

3 april 2026 om 22:00:00

Alert date:

4 april 2026 om 15:05:07

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems

Snes9K version 0.0.9z contains a critical buffer overflow vulnerability in the Netplay Socket Port Number field. The vulnerability allows local attackers to trigger a structured exception handler (SEH) overwrite by crafting malicious payloads. Attackers can paste the payload into the Socket Port Number field through the Netplay Options menu. The vulnerability enables code execution through SEH chain exploitation. This represents a significant security risk for users of the affected gaming emulator software.

Technical details

Mitigation steps:

Affected products:

Snes9K

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page