Goal Reached Thanks to every supporter โ€” we hit 100%!

Goal: 1000 CNY ยท Raised: 1000 CNY

100.0%

CVE-2026-24874 โ€” AI Deep Analysis Summary

CVSS 9.1 ยท Critical

Q1What is this vulnerability? (Essence + Consequences)

๐Ÿšจ **Essence**: Type confusion in `STALKER-Anomaly-modded-exes` due to incompatible resource access. ๐Ÿ’ฅ **Consequences**: High risk of **Code Execution** or **System Crash**.โ€ฆ

Q2Root Cause? (CWE/Flaw)

๐Ÿ›ก๏ธ **Root Cause**: **CWE-843** (Access of Resource Using Incompatible Type). The engine misinterprets data types when accessing resources, leading to memory corruption or logic errors.โ€ฆ

Q3Who is affected? (Versions/Components)

๐ŸŽฎ **Affected**: `xray-monolith` product by vendor `themrdemonized`. ๐Ÿ“… **Versions**: `STALKER-Anomaly-modded-exes` **before 2025.12.30**. โœ… **Safe**: Versions >= 2025.12.30 are patched.

Q4What can hackers do? (Privileges/Data)

๐Ÿ’€ **Attacker Actions**: Full **Confidentiality** & **Integrity** compromise. ๐Ÿ“‚ **Privileges**: No authentication required (PR:N). Can likely execute arbitrary code or crash the game engine remotely/locally.โ€ฆ

Q5Is exploitation threshold high? (Auth/Config)

โšก **Threshold**: **LOW**. ๐ŸŒ **Network**: Attack Vector is Network (AV:N). ๐Ÿ”‘ **Auth**: None required (PR:N). ๐Ÿ‘ค **User Interaction**: None required (UI:N). Easy to exploit if the vulnerable binary is exposed or processed.

Q6Is there a public Exp? (PoC/Wild Exploitation)

๐Ÿ•ต๏ธ **Public Exploit**: **No** public PoC listed in data (pocs: []). ๐Ÿ”— **Reference**: Fix details in GitHub PR #399. โš ๏ธ **Wild Exploitation**: Unknown, but low barrier suggests potential for future wild exploits.

Q7How to self-check? (Features/Scanning)

๐Ÿ” **Self-Check**: Verify version number. โŒ **Vulnerable**: Any build dated **before 2025-12-30**. โœ… **Safe**: Build **2025-12-30** or later.โ€ฆ

Q8Is it fixed officially? (Patch/Mitigation)

๐Ÿฉน **Fixed**: **YES**. ๐Ÿ“… **Patch Date**: 2025.12.30. ๐Ÿ”— **Source**: GitHub Pull Request #399 by `themrdemonized`. ๐Ÿ”„ **Action**: Update to the latest release immediately.

Q9What if no patch? (Workaround)

๐Ÿšง **No Patch Workaround**: Isolate the game engine. ๐Ÿšซ **Block**: Prevent network access to the vulnerable executable if possible. ๐Ÿ›‘ **Mitigation**: Do not load untrusted mods or resources until patched.โ€ฆ

Q10Is it urgent? (Priority Suggestion)

๐Ÿ”ฅ **Urgency**: **HIGH**. ๐Ÿ“Š **CVSS**: High severity (C:H, I:H). ๐Ÿšจ **Priority**: Patch immediately. โณ **Risk**: Unauthenticated network access makes this critical for any online or mod-sharing components.โ€ฆ