Home Inbit CVE-2023-54330
Back to Inbit

CVE-2023-54330

Inbit Messenger - Network Handler

Inbit CVSS 9.8 Updated March 18, 2026

Executive Risk Summary

"Inbit Messenger versions 4.6.0 to 4.9.0 are vulnerable to a remote stack-based buffer overflow, allowing unauthenticated attackers to execute arbitrary code by sending malformed network packets. This vulnerability can be exploited to overwrite the Structured Exception Handler (SEH) and execute shellcode on vulnerable Windows systems."

Operational Audit Arsenal

Target Type DLL
Target Asset InbitMessenger.exe
Standard Path %ProgramFiles%\Inbit\Inbit Messenger
PowerShell
# 🛠️ Senior Engineer Universal Audit
# Target: InbitMessenger.exe (DLL)
$Targets = 'InbitMessenger.exe'
$SearchPaths = @("$env:windir\System32", "$env:ProgramFiles", "${env:ProgramFiles(x86)}")

Get-ChildItem -Path $SearchPaths -Include $Targets -Recurse -ErrorAction SilentlyContinue | 
Select-Object FullName, @{Name="Version";Expression={$_.VersionInfo.ProductVersion}}

Patch Impact Forecast

Reboot Required Likely

Moderate

Internal Work Notes

Inbit Messenger remote buffer overflow vulnerability (CVE-2023-54330) - apply patch to prevent arbitrary code execution

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.