No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 18 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 18 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters results in stack-based buffer overflow. The attack may be initiated remotely. The patch is named 0c957ec03054eb6c8205e9c9d1d05d90ada3898c. It is suggested to install a patch to address this issue. | |
| Title | lwIP snmpv3 USM snmp_msg.c snmp_parse_inbound_frame stack-based overflow | |
| First Time appeared |
N
N lwip |
|
| Weaknesses | CWE-119 CWE-121 |
|
| CPEs | cpe:2.3:a:n:lwip:*:*:*:*:*:*:*:* | |
| Vendors & Products |
N
N lwip |
|
| References |
|
|
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-18T19:20:22.909Z
Reserved: 2026-05-18T14:20:09.110Z
Link: CVE-2026-8836
Updated: 2026-05-18T19:20:17.080Z
Status : Deferred
Published: 2026-05-18T19:16:28.533
Modified: 2026-05-18T19:26:31.620
Link: CVE-2026-8836
No data.
OpenCVE Enrichment
Updated: 2026-05-18T20:30:05Z