CVE-2026-24821

N/A Unknown

📋 TL;DR

An out-of-bounds read vulnerability in WickedEngine's LUA parser allows attackers to read memory beyond allocated buffers. This affects applications using WickedEngine's LUA modules through version 0.71.727, potentially exposing sensitive data or causing crashes.

💻 Affected Systems

Products:
  • WickedEngine
Versions: through 0.71.727
Operating Systems: all
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems using WickedEngine's LUA modules. Applications must be actively parsing LUA scripts to be vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure of sensitive memory contents, potential remote code execution through memory corruption chaining, or complete application crash leading to denial of service.

🟠

Likely Case

Application instability or crashes, potential information leakage from adjacent memory regions, and denial of service conditions.

🟢

If Mitigated

Limited impact with proper memory protections and sandboxing, potentially just application crashes without data exposure.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting malicious LUA scripts that trigger the out-of-bounds read condition in the parser.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 0.71.728 or later

Vendor Advisory: https://github.com/turanszkij/WickedEngine/pull/1095

Restart Required: Yes

Instructions:

1. Update WickedEngine to version 0.71.728 or later. 2. Rebuild any applications using WickedEngine. 3. Restart affected services.

🔧 Temporary Workarounds

Disable LUA Scripting

all

Temporarily disable LUA script parsing in WickedEngine if not required

Modify application configuration to disable LUA modules

Input Validation

all

Implement strict validation of LUA scripts before processing

Add script validation layer before passing to WickedEngine parser

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks
  • Implement application sandboxing and memory protection controls

🔍 How to Verify

Check if Vulnerable:

Check WickedEngine version and verify if LUA modules are enabled

Check Version:

Check application dependencies or build configuration for WickedEngine version

Verify Fix Applied:

Confirm WickedEngine version is 0.71.728 or later and test LUA parsing functionality

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unexpected LUA parsing errors
  • Memory dump patterns in crash logs

Network Indicators:

  • Unusual LUA script uploads or transfers to affected systems

SIEM Query:

Search for process crashes with WickedEngine components and memory access violation exceptions

🔗 References

📤 Share & Export