HIGHVulnerability
Verified
Global

NVD HIGH: CVE-2016-20040 — TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM para...

Saturday, March 28, 2026 at 12:15 PM UTC·Source: NIST NVD

Updated: Friday, April 3, 2026 at 02:38 AM UTC

Executive Summary

TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM parameter handling that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized ROM parameter to the tiemu command-line interface to overflow the stack buffer and overwrite the instruction pointer with malicious addresses.

Analysis

TiEmu 3.03-nogdb+dfsg-3 contains a buffer overflow vulnerability in the ROM parameter handling that allows local attackers to crash the application or execute arbitrary code. Attackers can supply an oversized ROM parameter to the tiemu command-line interface to overflow the stack buffer and overwrite the instruction pointer with malicious addresses. CVSS Score: 8.4. Published: 2026-03-28T12:15:59.670.

Indicators of Compromise (1)

CVE (1)
CVE-2016-20040
Source Attribution

Originally published by NIST NVD on Mar 28, 2026. Verified by: NIST.

Related Threats