Cyber Posture

CVE-2016-20048

HighPublic PoC

Published: 28 March 2026

Published
28 March 2026
Modified
01 May 2026
KEV Added
Patch
CVSS Score 8.4 CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0003 7.1th percentile
Risk Priority 17 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2016-20048 is a high-severity Path Traversal (CWE-22) vulnerability in Ossp (inferred from references). Its CVSS base score is 8.4 (High).

Operationally, ranked at the 7.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 requires timely identification, reporting, and correction of flaws like the buffer overflow in iSelect, directly preventing exploitation by patching or updating the vulnerable software.

prevent

SI-10 mandates validation of information inputs such as the oversized -k/--key parameter, preventing the stack buffer overflow by enforcing bounds checking on command-line arguments.

prevent

SI-16 implements memory protections like stack canaries, ASLR, and non-executable stacks to block arbitrary code execution even if the buffer overflow occurs in iSelect.

NVD Description

iSelect 1.4.0-2+b1 contains a local buffer overflow vulnerability that allows local attackers to execute arbitrary code by supplying an oversized value to the -k/--key parameter. Attackers can craft a malicious argument containing a NOP sled, shellcode, and return address to…

more

overflow a 1024-byte stack buffer and gain code execution with user privileges.

Deeper analysisAI

CVE-2016-20048 is a local buffer overflow vulnerability affecting iSelect version 1.4.0-2+b1. The issue arises from supplying an oversized value to the -k or --key command-line parameter, which overflows a 1024-byte stack buffer. This flaw, published on 2026-03-28, carries a CVSS v3.1 base score of 8.4 (AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) and is classified under CWE-22.

Local attackers can exploit the vulnerability with no privileges required by crafting a malicious argument that includes a NOP sled, shellcode, and return address. Successful exploitation leads to arbitrary code execution with the privileges of the user running iSelect.

Resources for further details include the iSelect project page at http://www.ossp.org/pkg/tool/iselect/, a proof-of-concept exploit at https://www.exploit-db.com/exploits/41076, and a VulnCheck advisory at https://www.vulncheck.com/advisories/iselect-2-b1-local-buffer-overflow-via-key-parameter. No specific patches or mitigations are detailed in the available information.

Details

CWE(s)

Affected Products

Ossp
inferred from references and description; NVD did not file a CPE for this CVE

CVEs Like This One

CVE-2026-23536Shared CWE-22
CVE-2025-23422Shared CWE-22
CVE-2024-48885Shared CWE-22
CVE-2024-12849Shared CWE-22
CVE-2026-33656Shared CWE-22
CVE-2025-8343Shared CWE-22
CVE-2025-59384Shared CWE-22
CVE-2026-3051Shared CWE-22
CVE-2025-15031Shared CWE-22
CVE-2025-12062Shared CWE-22

References