CVE-2026-24827
Unknown Unknown - Not Provided
Out-of-Bounds Write in Commander-Genius Before Release

Publication date: 2026-01-27

Last updated on: 2026-01-27

Assigner: Government Technology Agency of Singapore Cyber Security Group (GovTech CSG)

Description
Out-of-bounds Write vulnerability in gerstrong Commander-Genius.This issue affects Commander-Genius: before Release refs/pull/358/merge.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-27
Last Modified
2026-01-27
Generated
2026-05-07
AI Q&A
2026-01-27
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
gerstrong commander-genius to release (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds write issue in the Commander-Genius project, specifically in cloned Lua source files. It arises from improper handling of stack space during error processing, which was fixed by backporting a critical security patch from the official Lua project. The patch prevents potential exploitation by ensuring safe stack management when errors occur. [1]


How can this vulnerability impact me? :

The vulnerability can lead to an out-of-bounds write, which may cause application crashes or potentially allow an attacker to execute arbitrary code or disrupt the normal operation of the software. This impacts the availability and integrity of the affected system. [1]


What immediate steps should I take to mitigate this vulnerability?

Apply the security patch provided in the Commander-Genius project pull request #379, which backports the critical Lua security fix to the cloned Lua source files `GsKit/base/lua/ldebug.c` and `GsKit/base/lua/lvm.c`. This patch addresses the out-of-bounds write vulnerability by improving stack space handling during error processing. Updating your Commander-Genius installation to include this patch or a later release that contains it is the recommended immediate mitigation step. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart