The tool founds it is solvable if the user controls the initial value of a local variable (which is usually not possible)
The initial value of a local variable can be controlled if you can control the final value of a local value in a previously called function that happens to wind up at the same point on the stack, if that local variable is not explicitly initialized.
Exactly, but since this is not a possibility in the analyzed binary (the stack memory of this variable is not flagged as user-controllable), the solution can't be used to exploit it.
Btw, the project is looking for collaborators. I belive this is the kind of approach to discover and report security vulnerabilities in the 21st century..
With no free/open-source x86-->REIL translator, this is not as exciting as I was hoping it is.
Good luck with it though. Am a bit disappointed as I can't test it right away.