Buffer Overflow
Buffer Overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially allowing attackers to overwrite adjacent memory and execute arbitrary code.
104
CRITICAL
Execution
Understanding Buffer Overflow
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Buffer Overflow CVEs (104)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2025-10685 | 7.7 | This vulnerability allows an attacker to execute arbitrary code on affected Softing Industrial Automation web server modules, potentially taking control of the device. It can be exploited if the attacker has access to the network where the devices are located and is using specific versions of the software. | Unknown | Exploit Available | 22 days agoMar 16, 2026 |
| CVE-2025-71263 | 7.4 | This vulnerability allows a local user to gain root privileges on a system by exploiting a flaw in the su command that can be triggered by entering a long password. However, it's important to note that this issue is primarily relevant only in very rare and outdated lab environments, as UNIX Fourth Research Edition is not commonly used today. | Unknown | Theoretical | 25 days agoMar 13, 2026 |
| CVE-2026-4042 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on the Tenda i12 router by exploiting a flaw in how it handles certain input, potentially taking control of the device. The attacker needs to send a specially crafted request to the router, and since the exploit is publicly available, it poses a significant risk to users. | Unknown | Exploit Available | 26 days agoMar 12, 2026 |
| CVE-2026-4041 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on affected Tenda i12 devices by exploiting a flaw in how the device handles input commands, potentially taking control of the device. The attack can be carried out without needing physical access, making it particularly dangerous for users. | Unknown | Exploit Available | 26 days agoMar 12, 2026 |
| CVE-2026-4015 | 4.8 | This vulnerability allows an attacker to execute code on a local machine by exploiting a flaw in the TeXML File Parser, which can lead to a stack-based buffer overflow. To successfully carry out the attack, the attacker must manipulate the input processed by this parser, so it's crucial to apply the recommended patch to prevent potential exploitation. | Unknown | Exploit Available | 26 days agoMar 12, 2026 |
| CVE-2026-4008 | 7.4 | This vulnerability allows an attacker to remotely take control of a Tenda W3 router by exploiting a flaw in how it processes certain data, potentially leading to a crash or unauthorized access. The attacker needs to send a specially crafted request to the router, making it relatively easy to exploit if the device is connected to the internet. | Unknown | Exploit Available | 26 days agoMar 12, 2026 |
| CVE-2026-4007 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on the Tenda W3 router by exploiting a flaw in how it handles certain data, which can lead to a stack-based buffer overflow. The attack can be carried out without any special access, making it a significant risk for anyone using this router model. | Unknown | Exploit Available | 26 days agoMar 12, 2026 |
| CVE-2026-30931 | 7.8 | This vulnerability allows an attacker to exploit a flaw in ImageMagick's UHDR encoder, potentially leading to unauthorized access or control over the system by writing data outside the intended memory space. It affects versions prior to 7.1.2-16, so users must upgrade to this version or later to protect against this risk. | imagemagickimagemagick | Exploit Available | 28 days agoMar 10, 2026 |
| CVE-2026-28690 | 6.5 | An attacker can exploit a flaw in the MNG image handling of ImageMagick to overwrite parts of the program's memory, potentially allowing them to run malicious code. This vulnerability affects versions prior to 7.1.2-16 and 6.9.13-41, and it requires the attacker to trick a user into processing a specially crafted MNG image. | imagemagickimagemagick | Theoretical | 28 days agoMar 10, 2026 |
| CVE-2026-28494 | 7.1 | This vulnerability allows an attacker to crash the ImageMagick software or potentially execute malicious code by sending specially crafted image processing requests that exceed the expected size limits. It affects versions prior to 7.1.2-16 and 6.9.13-41, so users running older versions are at risk if they process untrusted image data. | imagemagickimagemagick | Exploit Available | 28 days agoMar 10, 2026 |
| CVE-2026-3038 | 7.5 | This vulnerability allows an unprivileged user to crash the operating system by exploiting a flaw in the way routing information is handled, leading to a stack overflow. While the crash is a protective measure, it could potentially be bypassed by other vulnerabilities, allowing an attacker to gain higher privileges on the system. | Unknown | Exploit Available | 29 days agoMar 9, 2026 |
| CVE-2026-3815 | 7.4 | An attacker can remotely exploit a vulnerability in the UTT HiPER 810G firmware to execute a buffer overflow, potentially allowing them to take control of the device. This issue affects versions up to 1.7.7-1711 and requires no special access, making it particularly dangerous. | utt810g firmware | Exploit Available | 29 days agoMar 9, 2026 |
| CVE-2026-3814 | 7.4 | An attacker can remotely exploit a buffer overflow vulnerability in the UTT HiPER 810G firmware, potentially allowing them to execute arbitrary code on the device. This issue affects versions up to 1.7.7-1711, and the exploit is publicly available, making it easier for attackers to launch an attack. | utt810g firmware | Exploit Available | 29 days agoMar 9, 2026 |
| CVE-2026-3811 | 7.4 | An attacker can remotely exploit a vulnerability in Tenda FH1202 routers to execute arbitrary code by sending specially crafted data to a specific function, which can lead to a crash or unauthorized control of the device. This attack requires no physical access and can be carried out over the internet, making it a significant risk for users with this firmware version. | tendafh1202 firmware | Exploit Available | 29 days agoMar 9, 2026 |
| CVE-2025-41766 | 8.8 | This vulnerability allows a low-privileged remote attacker to take complete control of a device by sending a specially crafted HTTP POST request. The attacker only needs network access to the device to exploit this weakness, making it a serious risk for systems using this firmware. | mbs-solutionsuniversal bacnet router firmware | Theoretical | 29 days agoMar 9, 2026 |
| CVE-2026-3810 | 7.4 | This vulnerability allows an attacker to remotely take control of the Tenda FH1202 router by exploiting a flaw in its DHCP client list function, which can lead to a crash or unauthorized access to the device. The attacker needs to send specially crafted data to the router, making it possible for them to execute harmful code on the device. | tendafh1202 firmware | Exploit Available | 29 days agoMar 9, 2026 |
| CVE-2026-3809 | 7.4 | An attacker can remotely exploit a flaw in the Tenda FH1202 router's firmware to execute arbitrary code by manipulating a specific setting, potentially taking control of the device. This vulnerability requires no special access, making it easy for attackers to target affected routers over the internet. | tendafh1202 firmware | Exploit Available | 29 days agoMar 9, 2026 |
| CVE-2026-3808 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on the Tenda FH1202 router by exploiting a flaw in how the device handles certain input data. The attacker needs to manipulate a specific argument in the router's web interface, which could lead to unauthorized access or control of the device. | tendafh1202 firmware | Exploit Available | 29 days agoMar 9, 2026 |
| CVE-2026-3823 | 9.3 | This vulnerability allows unauthenticated remote attackers to take control of the switch's software and run any code they want. It requires no special access or credentials, making it particularly dangerous for networks using this firmware. | blackbeartechhiveatop ehg2408 firmware | Exploit Available | 29 days agoMar 9, 2026 |
| CVE-2026-3807 | 7.4 | An attacker can remotely exploit a vulnerability in the Tenda FH1202 router to execute arbitrary code by sending specially crafted data that causes a buffer overflow, potentially taking control of the device. This attack can happen without needing physical access, making it a serious risk for users of this router firmware version. | tendafh1202 firmware | Exploit Available | 29 days agoMar 9, 2026 |