CVE-2026-24820

N/A Unknown

📋 TL;DR

An out-of-bounds read vulnerability in WickedEngine's LUA modules (specifically ldebug.C) allows attackers to read memory beyond allocated buffers. This affects applications using WickedEngine's LUA scripting capabilities before version 0.71.705. Game developers and applications embedding WickedEngine are primarily affected.

💻 Affected Systems

Products:
  • WickedEngine
Versions: All versions before 0.71.705
Operating Systems: All platforms where WickedEngine runs (Windows, Linux, potentially others)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using WickedEngine's LUA scripting modules. Applications not using LUA scripting may not be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure leading to memory content leakage, potential ASLR bypass, or application crash enabling denial of service.

🟠

Likely Case

Application instability, crashes, or limited information disclosure depending on memory layout and attacker control.

🟢

If Mitigated

Controlled crashes with minimal data exposure if proper memory protections and sandboxing are implemented.

🌐 Internet-Facing: MEDIUM - Exploitation requires attacker to supply malicious LUA scripts, which may be possible in multiplayer games or modding scenarios.
🏢 Internal Only: LOW - Primarily affects development environments and applications using WickedEngine's LUA capabilities.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires ability to supply malicious LUA scripts to the vulnerable component. No public exploit code is currently known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.71.705 or later

Vendor Advisory: https://github.com/turanszkij/WickedEngine/pull/1054

Restart Required: Yes

Instructions:

1. Update WickedEngine to version 0.71.705 or later. 2. Rebuild any applications using WickedEngine. 3. Redeploy updated applications.

🔧 Temporary Workarounds

Disable LUA Scripting

all

Disable WickedEngine's LUA modules if not required for functionality

Modify application configuration to disable LUA scripting support

🧯 If You Can't Patch

  • Implement strict input validation for LUA scripts
  • Run WickedEngine in sandboxed/isolated environment

🔍 How to Verify

Check if Vulnerable:

Check WickedEngine version in application dependencies or build configuration

Check Version:

Check WickedEngine version in project configuration files or build logs

Verify Fix Applied:

Verify WickedEngine version is 0.71.705 or later and application has been rebuilt

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected LUA script execution errors

Network Indicators:

  • Unusual LUA script uploads or transfers if applicable

SIEM Query:

Search for application crashes with memory access violation codes related to WickedEngine processes

🔗 References

📤 Share & Export