Home rAthena CVE-2025-58447
Back to rAthena

CVE-2025-58447

rAthena - Login Server

rAthena CVSS 9.8 Updated April 6, 2026

Executive Risk Summary

"A heap-based buffer overflow vulnerability exists in the rAthena login server, allowing a remote attacker to crash the server and potentially achieve remote code execution via heap corruption. The issue is fixed in commit 2f5248b."

Anticipated Attack Path

  1. 1. Send a crafted `CA_SSO_LOGIN_REQ` with an oversized token length
  2. 2. Overwrite adjacent session fields on the heap
  3. 3. Achieve remote code execution via heap corruption

Am I Vulnerable?

  • Verify the rAthena version is prior to commit 2f5248b
  • Check for unusual login server crashes or instability
  • Monitor for signs of remote code execution or unauthorized access

Operational Audit Arsenal

Target Type Process
Target Asset rAthena login server process
Standard Path /path/to/rathena/login-server

Manual Verification Required

This is a non-Windows asset (rAthena). Use the target asset details and official path provided above to verify your current version against the official vendor advisories listed below.

Patch Impact Forecast

Reboot Required Unlikely

Minimal, as the patch only updates the login server component

Internal Work Notes

Urgent: rAthena login server vulnerability (CVE-2025-58447) - apply commit 2f5248b to prevent remote code execution and denial of service.

Technical Intelligence & Operational Utilities • Delivered Weekly

Intelligence Sources

Data compiled from NVD, MSRC, and CISA KEV Catalog. Intelligence synthesized via AI. Scripts provided for diagnostic purposes under MIT License.