CVE-2026-3393

A security vulnerability has been detected in jarikomppa soloud up to 20200207. The impacted element is the function SoLoud::Wav::loadflac of the file src/audiosource/wav/soloud_wav.cpp of the component Audio File Handler. Such manipulation leads to heap-based buffer overflow. The attack must be carried out locally. The exploit has been disclosed publicly and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/jarikomppa/soloud/ Product
https://github.com/jarikomppa/soloud/issues/401 Exploit Issue Tracking Vendor Advisory
https://github.com/oneafter/0209/blob/main/so1/repro Exploit
https://vuldb.com/?ctiid.348279 Permissions Required VDB Entry
https://vuldb.com/?id.348279 Third Party Advisory VDB Entry
https://vuldb.com/?submit.761338 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:solhsa:soloud:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-01 13:16

Updated : 2026-03-13 14:23


NVD link : CVE-2026-3393

Mitre link : CVE-2026-3393

CVE.ORG link : CVE-2026-3393


JSON object : View

Products Affected

solhsa

  • soloud
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-122

Heap-based Buffer Overflow