Xion Audio Player versions prior to 1.0.126 are vulnerable to a Unicode-based stack buffer overflow triggered by opening a specially crafted .m3u playlist file. The file contains an overly long string that overwrites the Structured Exception Handler (SEH) chain, allowing an attacker to hijack execution flow and run arbitrary code.
https://www.vulncheck.com/advisories/xion-audio-player-unicode-stack-buffer-overflow
https://www.r2.com.au/page/products/download/xion-audio-player/
https://www.exploit-db.com/exploits/16653
https://www.exploit-db.com/exploits/15598
https://www.exploit-db.com/exploits/14633
Published: 2025-08-20
Updated: 2025-08-22
Base Score: 7.5
Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P
Severity: High
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
Base Score: 8.4
Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:A/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
Severity: High
EPSS: 0.00022