CVE-2026-3394

A vulnerability was detected in jarikomppa soloud up to 20200207. This affects the function SoLoud::Wav::loadwav of the file src/audiosource/wav/soloud_wav.cpp of the component WAV File Parser. Performing a manipulation results in memory corruption. The attack must be initiated from a local position. The exploit is now public and may be used. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/jarikomppa/soloud/ Product
https://github.com/jarikomppa/soloud/issues/401 Exploit Issue Tracking Vendor Advisory
https://github.com/oneafter/0209/blob/main/so2/repro Exploit
https://vuldb.com/?ctiid.348280 Permissions Required VDB Entry
https://vuldb.com/?id.348280 Third Party Advisory VDB Entry
https://vuldb.com/?submit.761339 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:solhsa:soloud:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-03-01 13:16

Updated : 2026-03-05 01:32


NVD link : CVE-2026-3394

Mitre link : CVE-2026-3394

CVE.ORG link : CVE-2026-3394


JSON object : View

Products Affected

solhsa

  • soloud
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer