### [CVE-2020-28600](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-28600) ![](https://img.shields.io/static/v1?label=Product&message=Openscad&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-119%3A%20Improper%20Restriction%20of%20Operations%20within%20the%20Bounds%20of%20a%20Memory%20Buffer&color=brighgreen) ### Description An out-of-bounds write vulnerability exists in the import_stl.cc:import_stl() functionality of Openscad openscad-2020.12-RC2. A specially crafted STL file can lead to code execution. An attacker can provide a malicious file to trigger this vulnerability. ### POC #### Reference - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1224 - https://talosintelligence.com/vulnerability_reports/TALOS-2020-1224 #### Github No PoCs found on GitHub currently.