CVE-2026-2653

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute arbitrary code on a system running an outdated version of admesh by exploiting a flaw in how the software handles certain data, specifically through a heap-based buffer overflow. The attacker needs to have local access to the system to carry out the attack, and since the software is not actively maintained, it may be more vulnerable to exploitation.

Technical Description

A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.

CVSS Vector Analysis

Attack VectorLocal
Attack ComplexityLow
Privileges RequiredLow
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeChanged

Vector String

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$638($500-$1K)
Vendor Response
Grade APatched in 2 days

Quick Information

Published

Feb 18, 2026

about 2 months ago

Last Modified

Feb 20, 2026

about 2 months ago

Vendor

admesh project

Product

admesh