{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2016-20040/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve-2016-20040","buffer-overflow","local-privilege-escalation"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eTiEmu, a Texas Instruments (TI) calculator emulator, version 3.03-nogdb+dfsg-3, is susceptible to a buffer overflow vulnerability (CVE-2016-20040). This flaw resides within the handling of ROM parameters passed via the command-line interface. An unauthenticated, local attacker can exploit this vulnerability by supplying an oversized ROM parameter. Successful exploitation allows the attacker to crash the application, potentially leading to a denial of service, or, more seriously, execute…\u003c/p\u003e\n","date_modified":"2026-03-28T12:15:59Z","date_published":"2026-03-28T12:15:59Z","id":"/briefs/2026-03-tiemu-buffer-overflow/","summary":"TiEmu 3.03 is vulnerable to a buffer overflow in ROM parameter handling, enabling local attackers to crash the application or execute arbitrary code by providing an oversized ROM parameter via the command-line interface.","title":"TiEmu 3.03 Buffer Overflow Vulnerability (CVE-2016-20040)","url":"https://feed.craftedsignal.io/briefs/2026-03-tiemu-buffer-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2016-20040","version":"https://jsonfeed.org/version/1.1"}