CVE-2023-54330
Severity CVSS v4.0:
CRITICAL
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
13/01/2026
Last modified:
13/01/2026
Description
Inbit Messenger versions 4.6.0 to 4.9.0 contain a remote stack-based buffer overflow vulnerability that allows unauthenticated attackers to execute arbitrary code by sending malformed network packets. Attackers can craft a specially designed payload targeting the messenger's network handler to overwrite the Structured Exception Handler (SEH) and execute shellcode on vulnerable Windows systems.
Impact
Base Score 4.0
9.30
Severity 4.0
CRITICAL
Base Score 3.x
9.80
Severity 3.x
CRITICAL
References to Advisories, Solutions, and Tools
- https://github.com/a-rey/exploits/blob/main/writeups/Inbit_Messenger/v4.6.0/writeup.md
- https://web.archive.org/web/20200122082432/https://www.softsea.com/review/Inbit-Messenger-Basic-Edition.html
- https://www.exploit-db.com/exploits/51126
- https://www.vulncheck.com/advisories/inbit-messenger-unauthenticated-remote-seh-overflow



