CVE-2026-2653
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to execute arbitrary code on a system running an outdated version of admesh by exploiting a flaw in how the software handles certain data, specifically through a heap-based buffer overflow. The attacker needs to have local access to the system to carry out the attack, and since the software is not actively maintained, it may be more vulnerable to exploitation.
Technical Description
A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.
CVSS Vector Analysis
Vector String
CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:XExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Feb 18, 2026
about 2 months ago
Last Modified
Feb 20, 2026
about 2 months ago
Vendor
admesh project
Product
admesh