CVE-2026-24809

N/A Unknown

📋 TL;DR

A heap-buffer overflow vulnerability in the luaG_runerror function in praydog/REFramework allows attackers to execute arbitrary code or cause denial of service when a recursive error occurs. This affects users of REFramework versions before 1.5.5 who process untrusted Lua scripts. The vulnerability stems from improper bounds checking during error handling.

💻 Affected Systems

Products:
  • praydog/REFramework
Versions: All versions before 1.5.5
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Vulnerability triggers when processing Lua scripts that cause recursive errors. Most users are gamers/modders using REFramework for game modifications.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution leading to complete system compromise, data theft, or ransomware deployment.

🟠

Likely Case

Application crash or denial of service, potentially allowing privilege escalation if the framework runs with elevated permissions.

🟢

If Mitigated

Contained application crash without system compromise if proper sandboxing and memory protections are enabled.

🌐 Internet-Facing: MEDIUM - Requires processing untrusted Lua scripts, which may occur in modding communities or game servers.
🏢 Internal Only: LOW - Primarily affects gaming/modding tools rather than enterprise infrastructure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires crafting malicious Lua scripts that trigger recursive errors. No public exploits have been reported as of analysis.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 1.5.5

Vendor Advisory: https://github.com/praydog/REFramework/pull/1320

Restart Required: Yes

Instructions:

1. Download REFramework version 1.5.5 or later from GitHub. 2. Replace existing REFramework files with the updated version. 3. Restart any applications using REFramework.

🔧 Temporary Workarounds

Disable Lua Script Processing

all

Prevent REFramework from executing Lua scripts to eliminate attack surface.

Modify REFramework configuration to disable Lua support

🧯 If You Can't Patch

  • Restrict REFramework to trusted Lua scripts only from verified sources.
  • Run REFramework in a sandboxed environment with limited permissions.

🔍 How to Verify

Check if Vulnerable:

Check REFramework version in application settings or about dialog. Versions below 1.5.5 are vulnerable.

Check Version:

Check REFramework UI or configuration files for version information.

Verify Fix Applied:

Confirm version is 1.5.5 or higher and test with known problematic Lua scripts if available.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Error logs containing 'luaG_runerror' or heap corruption messages

Network Indicators:

  • Unusual Lua script downloads to systems running REFramework

SIEM Query:

Process: REFramework AND (EventID: 1000 OR ExceptionCode: c0000005)

🔗 References

📤 Share & Export