CVE-2026-21870
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to crash the BACnet application by sending a specially crafted string that exceeds the buffer limit, leading to a stack overflow. The attacker needs to exploit the ubasic interpreter in specific versions of the BACnet Protocol Stack library, which improperly handles long strings, causing the application to terminate unexpectedly.
Technical Description
BACnet Protocol Stack library provides a BACnet application layer, network layer and media access (MAC) layer communications services. In 1.4.2, 1.5.0.rc2, and earlier, an off-by-one stack-based buffer overflow in the ubasic interpreter causes a crash (SIGABRT) when processing string literals longer than the buffer limit. The tokenizer_string function in src/bacnet/basic/program/ubasic/tokenizer.c incorrectly handles null termination for maximum-length strings. It writes a null byte to dest[40] when the buffer size is only 40 (indices 0-39), triggering a stack overflow.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 13, 2026
7 days ago
Last Modified
Feb 18, 2026
2 days ago
Vendor
bacnetstack
Product
bacnet stack