HomeIntelligenceBrief
VULNERABILITY BRIEF🟠 High Vulnerability

Stack Buffer Overflow in GeographicLib v2.5.1 Enables Remote Code Execution

A publicly disclosed stack buffer overflow (CVE‑2025‑60751) in GeographicLib v2.5.1 allows remote code execution on Linux hosts. The library is embedded in many SaaS and research applications, creating a supply‑chain risk for third‑party vendors.

LiveThreat™ Intelligence · 📅 April 29, 2026· 📰 exploit-db.com
🟠
Severity
High
VU
Type
Vulnerability
🎯
Confidence
High
🏢
Affected
4 sector(s)
Actions
3 recommended
📰
Source
exploit-db.com

Stack Buffer Overflow in GeographicLib v2.5.1 Enables Remote Code Execution

What Happened — A stack buffer overflow (CVE‑2025‑60751) was identified in GeographicLib v2.5.1. Public exploit code shows that an attacker can overflow 136 bytes and execute arbitrary commands on the host system. The flaw impacts any software that links against the vulnerable library.

Why It Matters for TPRM

  • GeographicLib is embedded in many geospatial, navigation, and scientific‑computing SaaS offerings, creating a supply‑chain exposure for downstream vendors.
  • Remote code execution can lead to data breach, service disruption, or full system compromise of the third‑party service.
  • The exploit is publicly available, increasing the probability of opportunistic attacks.

Who Is Affected — Technology, SaaS, cloud‑infrastructure, and research organizations that use GeographicLib (directly or via third‑party components).

Recommended Actions

  • Inventory all applications and services that depend on GeographicLib ≤ v2.5.1.
  • Upgrade to GeographicLib v2.5.2 (or later) where the overflow is patched.
  • Apply compiler‑level hardening (stack canaries, ASLR, PIE) and monitor for abnormal process behavior.

Technical Notes — The overflow occurs in the GeoConvert binary; after 136 bytes the return address can be overwritten. Exploit leverages a ROP chain (pop rdi; ret → system("/bin/sh") → exit). No vendor‑issued patch existed at disclosure. Source: Exploit‑DB 52522

📰 Original Source
https://www.exploit-db.com/exploits/52522

This LiveThreat Intelligence Brief is an independent analysis. Read the original reporting at the link above.

Monitor Your Vendor Risk with LiveThreat™

Get automated breach alerts, security scorecards, and intelligence briefs when your vendors are compromised.