Potential read out of bounds case with wolfSSHd on Windows while handling a terminal resize request. An authenticated user could trigger the out of bounds read after establishing a connection which would leak the adjacent stack memory to the pseudo-console output.

Project Subscriptions

No data.

Advisories

No advisories yet.

Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Mon, 20 Apr 2026 21:45:00 +0000

Type Values Removed Values Added
Description Potential read out of bounds case with wolfSSHd on Windows while handling a terminal resize request. An authenticated user could trigger the out of bounds read after establishing a connection which would leak the adjacent stack memory to the pseudo-console output.
Title Potential wolfSSHd Buffer out-of-bounds Read on Windows Handling Terminal Resize
Weaknesses CWE-126
References
Metrics cvssV4_0

{'score': 2.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:P/PR:L/UI:N/VC:L/VI:N/VA:L/SC:N/SI:N/SA:N'}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: wolfSSL

Published:

Updated: 2026-04-20T21:28:33.227Z

Reserved: 2026-01-13T23:45:50.452Z

Link: CVE-2026-0930

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Received

Published: 2026-04-20T22:16:23.210

Modified: 2026-04-20T22:16:23.210

Link: CVE-2026-0930

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-21T00:00:13Z

Weaknesses