CVE-2016-20041

HIGH

Yasr 0.6.9-5 Buffer Overflow via Command-line Parameter

Title source: cna
STIX 2.1

Description

Yasr 0.6.9-5 contains a buffer overflow vulnerability that allows local attackers to crash the application or execute arbitrary code by supplying an oversized argument to the -p parameter. Attackers can invoke yasr with a crafted payload containing junk data, shellcode, and a return address to overwrite the stack and trigger code execution.

Exploits (1)

exploitdb WORKING POC
by Juan Sacco · pythonlocallinux
https://www.exploit-db.com/exploits/39734

Scores

CVSS v3 8.4
EPSS 0.0003
EPSS Percentile 6.8%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation poc
Automatable no
Technical Impact total

Details

CWE
CWE-22
Status published
Products (1)
yasr/Yasr Screen Reader 0.6.9-5
Published Mar 28, 2026
Tracked Since Mar 29, 2026