Cyber Posture

CVE-2025-14308

Critical

Published: 09 December 2025

Published
09 December 2025
Modified
05 January 2026
KEV Added
Patch
CVSS Score 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0008 23.1th percentile
Risk Priority 20 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2025-14308 is a critical-severity Integer Overflow or Wraparound (CWE-190) vulnerability in Robocode Robocode. Its CVSS base score is 9.8 (Critical).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 23.1th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190). What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-10 requires validation of information inputs, directly preventing integer overflows from specially crafted data lengths in the Buffer write method.

prevent

SI-2 mandates identification, reporting, and correction of system flaws, directly addressing the integer overflow vulnerability through patching as indicated by the available pull request.

prevent

SI-16 implements memory protections that prevent arbitrary code execution resulting from buffer overflows triggered by the integer overflow.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Why these techniques?

The vulnerability allows remote, unauthenticated arbitrary code execution via network exploitation of a public-facing application component, directly mapping to T1190: Exploit Public-Facing Application.

Confidence: HIGH · MITRE ATT&CK Enterprise v19.0

NVD Description

An integer overflow vulnerability exists in the write method of the Buffer class in Robocode version 1.9.3.6. The method fails to properly validate the length of data being written, allowing attackers to cause an overflow, potentially leading to buffer overflows…

more

and arbitrary code execution. This vulnerability can be exploited by submitting specially crafted inputs that manipulate the data length, leading to potential unauthorized code execution.

Deeper analysisAI

CVE-2025-14308 is an integer overflow vulnerability (CWE-190) in the write method of the Buffer class in Robocode version 1.9.3.6, published on 2025-12-09. The method fails to properly validate the length of data being written, allowing attackers to trigger an overflow that can lead to buffer overflows and arbitrary code execution.

The vulnerability carries a CVSS v3.1 base score of 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H), making it exploitable over the network with low attack complexity by unauthenticated attackers without requiring user interaction. Attackers can submit specially crafted inputs that manipulate the data length, potentially achieving unauthorized code execution on affected systems.

A pull request addressing the issue is available at https://github.com/robo-code/robocode/pull/70.

Details

CWE(s)

Affected Products

robocode
robocode
1.9.3.6

CVEs Like This One

CVE-2025-14306Same product: Robocode Robocode
CVE-2025-53518Shared CWE-190
CVE-2026-41416Shared CWE-190
CVE-2024-55656Shared CWE-190
CVE-2026-5121Shared CWE-190
CVE-2025-27918Shared CWE-190
CVE-2025-0838Shared CWE-190
CVE-2025-30404Shared CWE-190
CVE-2026-25208Shared CWE-190
CVE-2026-24830Shared CWE-190

References