CVE-2026-24818
📋 TL;DR
An out-of-bounds read vulnerability in praydog UEVR's Lua parser component could allow attackers to read sensitive memory contents. This affects UEVR users running versions before 1.05 who process untrusted Lua scripts.
💻 Affected Systems
- praydog UEVR (Universal VR Mod)
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Information disclosure leading to memory leak of sensitive data, potential ASLR bypass, or crash causing denial of service
Likely Case
Application crash or instability when processing malformed Lua scripts
If Mitigated
Limited impact if only trusted Lua scripts are processed
🎯 Exploit Status
Exploitation requires crafting malicious Lua scripts that trigger the out-of-bounds read
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 1.05 and later
Vendor Advisory: https://github.com/praydog/UEVR/pull/337
Restart Required: Yes
Instructions:
1. Download UEVR version 1.05 or later from official sources
2. Replace existing UEVR installation with updated version
3. Restart any running UEVR processes
🔧 Temporary Workarounds
Restrict Lua script sources
allOnly load Lua scripts from trusted sources
🧯 If You Can't Patch
- Disable Lua script processing if not required
- Isolate UEVR in sandboxed environment
🔍 How to Verify
Check if Vulnerable:
Check UEVR version - if below 1.05, system is vulnerable
Check Version:
Check UEVR interface or documentation for version information
Verify Fix Applied:
Confirm UEVR version is 1.05 or higher
📡 Detection & Monitoring
Log Indicators:
- Application crashes with memory access violations
- Unexpected Lua parsing errors
Network Indicators:
- Not applicable - local vulnerability
SIEM Query:
Application logs showing UEVR crashes or Lua parsing failures