CVE-2025-58750
📋 TL;DR
This CVE describes a buffer overflow vulnerability in rAthena MMORPG server software where missing bounds checking in the character slot movement function allows attackers to read and write out of bounds using user input. This could lead to memory corruption, crashes, or potential remote code execution. All rAthena servers running versions before commit 0cc348b are affected.
💻 Affected Systems
- rAthena MMORPG Server
📦 What is this software?
Rathena by Rathena
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution leading to complete server compromise, data theft, or server becoming part of a botnet.
Likely Case
Server crashes, denial of service, or memory corruption causing instability and potential data loss.
If Mitigated
Limited impact with proper network segmentation and access controls, potentially just crashes affecting availability.
🎯 Exploit Status
Exploitation requires sending crafted packets to the vulnerable function, but specific exploit details are not publicly documented.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: Commit 0cc348b186bbcc3c604c17c39589a319f27d469b or later
Vendor Advisory: https://github.com/rathena/rathena/security/advisories/GHSA-pjh7-jgr8-4ff6
Restart Required: Yes
Instructions:
1. Update rAthena to commit 0cc348b or later. 2. Recompile the server. 3. Restart the rAthena service.
🔧 Temporary Workarounds
Network Access Restriction
linuxRestrict access to the game server port to trusted IP addresses only.
iptables -A INPUT -p tcp --dport [GAME_PORT] -s [TRUSTED_IP] -j ACCEPT
iptables -A INPUT -p tcp --dport [GAME_PORT] -j DROP
🧯 If You Can't Patch
- Implement strict network segmentation to isolate the game server from critical infrastructure.
- Deploy intrusion detection/prevention systems to monitor for anomalous packet patterns.
🔍 How to Verify
Check if Vulnerable:
Check if your rAthena installation is using a commit hash earlier than 0cc348b186bbcc3c604c17c39589a319f27d469b.
Check Version:
git log --oneline -1
Verify Fix Applied:
Verify the current commit hash is 0cc348b186bbcc3c604c17c39589a319f27d469b or later.
📡 Detection & Monitoring
Log Indicators:
- Server crashes or segmentation faults
- Unusual memory access errors in logs
- Abnormal disconnections during character slot operations
Network Indicators:
- Malformed packets to the game server port
- Unusual packet sizes or patterns in character movement requests
SIEM Query:
source="*rathena*" AND ("segmentation fault" OR "out of bounds" OR "buffer overflow")