CVE-2026-33250

HIGH
2026-03-24 [email protected]
7.5
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
None
Integrity
None
Availability
High

Lifecycle Timeline

3
Patch Released
Mar 31, 2026 - 21:13 nvd
Patch available
Analysis Generated
Mar 24, 2026 - 00:22 vuln.today
CVE Published
Mar 24, 2026 - 00:16 nvd
HIGH 7.5

Description

Freeciv21 is a free open source, turn-based, empire-building strategy game. Versions prior to 3.1.1 crash with a stack overflow when receiving specially-crafted packets. A remote attacker can use this to take down any public server. A malicious server can use this to crash the game on the player's machine. Authentication is not needed and, by default, logs do not contain any useful information. All users should upgrade to Freeciv21 version 3.1.1. Running the server behind a firewall can help mitigate the issue for non-public servers. For local games, Freeciv21 restricts connections to the current user and is therefore not affected.

Analysis

Freeciv21, an open-source turn-based strategy game, contains a stack overflow vulnerability that allows remote attackers to crash servers or client applications through specially-crafted network packets. All versions prior to 3.1.1 are affected, with exploitation requiring no authentication and leaving no useful logs by default. …

Sign in for full analysis, threat intelligence, and remediation guidance.

Remediation

Within 24 hours: inventory all Freeciv21 deployments (game servers, client installations) and document version numbers; communicate risk to stakeholders. Within 7 days: disable public-facing Freeciv21 servers or restrict network access to trusted internal users only; update client advisory documentation. …

Sign in for detailed remediation steps.

Priority Score

38
Low Medium High Critical
KEV: 0
EPSS: +0.2
CVSS: +38
POC: 0

Vendor Status

Debian

Bug #1131524
freeciv
Release Status Fixed Version Urgency
bullseye fixed (unfixed) end-of-life
bookworm fixed 3.0.6-1+deb12u1 -
bookworm (security) fixed 3.0.6-1+deb12u1 -
trixie fixed 3.1.4+ds-2+deb13u1 -
trixie (security) fixed 3.1.4+ds-2+deb13u1 -
forky vulnerable 3.2.2+ds-1 -
sid fixed 3.2.4+ds-1 -
(unstable) fixed 3.2.4+ds-1 -

Share

CVE-2026-33250 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy