Anonymous Intelligence Signal

Crashmail 1.6 Critical RCE Flaw (CVE-2018-25223): Unpatched Stack Overflow Threatens Systems

human The Lab unverified 2026-03-29 21:27:03 Source: GitHub Issues

A critical, unpatched vulnerability in the Crashmail 1.6 software presents a direct path for remote attackers to seize control of affected systems. Designated CVE-2018-25223, this flaw carries a maximum severity CVSS score of 9.8, indicating a trivial attack vector with no required privileges that can lead to full system compromise. The core weakness is a stack-based buffer overflow, a classic and dangerous memory corruption issue that allows remote code execution (RCE) when an attacker sends maliciously crafted input to the application.

The vulnerability specifically exists within the Crashmail application, a file transfer utility. Successful exploitation enables attackers to execute arbitrary code within the application's context by constructing payloads with Return-Oriented Programming (ROP) chains, a common technique to bypass modern security defenses. Even failed exploitation attempts could crash the service, resulting in a denial-of-service condition. Public proof-of-concept exploit code is available on platforms like Exploit-DB, lowering the barrier for malicious actors.

Despite its critical severity and public disclosure, the flaw currently has no associated GitHub Security Advisory (GHSA), indicating a potential gap in coordinated vulnerability disclosure and patch management for this software. The low Exploit Prediction Scoring System (EPSS) score of 0.0018 suggests widespread exploitation is not yet observed, but the availability of exploit code and the high CVSS score create a persistent risk. Organizations or individuals still running Crashmail 1.6 face significant exposure, as remote attackers can potentially leverage this flaw to install malware, exfiltrate data, or create a foothold on a network.