This is a summary of the AI-generated 10-question deep analysis. The full version (longer answers, follow-up Q&A, related CVEs) requires login. Read the full analysis โ
Q1What is this vulnerability? (Essence + Consequences)
๐จ **Essence**: Type confusion in `STALKER-Anomaly-modded-exes` due to incompatible resource access. ๐ฅ **Consequences**: High risk of **Code Execution** or **System Crash**.โฆ
๐ก๏ธ **Root Cause**: **CWE-843** (Access of Resource Using Incompatible Type). The engine misinterprets data types when accessing resources, leading to memory corruption or logic errors.โฆ
๐ฎ **Affected**: `xray-monolith` product by vendor `themrdemonized`. ๐ **Versions**: `STALKER-Anomaly-modded-exes` **before 2025.12.30**. โ **Safe**: Versions >= 2025.12.30 are patched.
Q4What can hackers do? (Privileges/Data)
๐ **Attacker Actions**: Full **Confidentiality** & **Integrity** compromise. ๐ **Privileges**: No authentication required (PR:N). Can likely execute arbitrary code or crash the game engine remotely/locally.โฆ
๐ฉน **Fixed**: **YES**. ๐ **Patch Date**: 2025.12.30. ๐ **Source**: GitHub Pull Request #399 by `themrdemonized`. ๐ **Action**: Update to the latest release immediately.
Q9What if no patch? (Workaround)
๐ง **No Patch Workaround**: Isolate the game engine. ๐ซ **Block**: Prevent network access to the vulnerable executable if possible. ๐ **Mitigation**: Do not load untrusted mods or resources until patched.โฆ
๐ฅ **Urgency**: **HIGH**. ๐ **CVSS**: High severity (C:H, I:H). ๐จ **Priority**: Patch immediately. โณ **Risk**: Unauthenticated network access makes this critical for any online or mod-sharing components.โฆ