# Bome Restorator 1793 Denial of Service Vulnerability Summary ## Vulnerability Overview * **Vulnerability Name**: Bome Restorator 1793 Denial of Service via Buffer Overflow * **Vulnerability Type**: Classic Buffer Overflow * **Severity**: Medium * **Release Date**: April 26, 2026 * **CVSS Vector**: CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SL:N/SA:N ## Impact Scope * **Affected Software**: Bome Restorator 1793 * **Attack Condition**: Local Attackers * **Trigger Method**: An attacker can craft a malicious payload containing an overlong string exceeding 4000 bytes and paste it into the software’s “Name” input field. * **Consequence**: Causes the application to crash, resulting in a Denial of Service. ## Remediation * **Official Fix**: The page does not provide a specific patch download link or version number. * **Reference Links**: * Official Product Homepage: [Official Product Homepage](https://www.bome.com/) * Product Reference: [Product Reference](https://www.bome.com/restorator/) * **Recommended Measures**: Users are advised to upgrade to a version that has fixed this vulnerability, or if upgrading is not possible, avoid entering overly long strings into the “Name” field. ## POC/Exploit Code * No specific code blocks or scripts are provided on the page. * Exploitation method described as: Craft a malicious string exceeding 4000 bytes and paste it into the “Name” input box.