Buffer Overflow

Buffer Overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially allowing attackers to overwrite adjacent memory and execute arbitrary code.

Total CVEs

104

Typical Severity

CRITICAL

Category

Execution

Understanding Buffer Overflow

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Buffer Overflow CVEs (104)

DescriptionVendor / ProductExploit Status
CVE-2026-37327.4

An attacker can remotely exploit a vulnerability in the Tenda F453 router to execute arbitrary code by sending specially crafted commands, which can lead to full control over the device. This requires the attacker to know the specific command format to trigger a buffer overflow in the router's firmware.

tendaf453 firmware
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-37297.4

An attacker can remotely take control of the Tenda F453 router by exploiting a flaw in its firmware that allows them to overflow a memory area, potentially leading to unauthorized access or execution of malicious code. This vulnerability can be triggered by manipulating specific input fields, making it easy for attackers to exploit if they know how to send the right data.

tendaf453 firmware
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-37287.4

An attacker can remotely exploit a vulnerability in the Tenda F453 router to execute arbitrary code by causing a stack-based buffer overflow through a specific function in its firmware. This means that if the attacker knows how to manipulate certain inputs, they can gain control over the router and potentially compromise the network it’s connected to.

tendaf453 firmware
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-37277.4

This vulnerability allows an attacker to remotely execute malicious code on the Tenda F453 router by exploiting a flaw in the firmware that leads to a stack-based buffer overflow. The attacker needs to manipulate specific input fields, which means they can potentially take control of the device without needing physical access.

tendaf453 firmware
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-37267.4

An attacker can remotely exploit a vulnerability in the Tenda F453 router to execute arbitrary code by sending specially crafted data that causes a buffer overflow. This requires no special access, making it easy for attackers to take control of the device if it is connected to the internet.

tendaf453 firmware
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-37157.4

An attacker can remotely exploit a vulnerability in the Wavlink WL-WN579X3-C firmware to execute arbitrary code on the device by manipulating a specific setting, which could lead to full control over the device. To protect against this risk, users should upgrade to the latest firmware version as soon as possible.

wavlinkwl-wn579x3-c firmware
Exploit Available
about 1 month agoMar 8, 2026
CVE-2026-290688.7

This vulnerability allows an attacker to crash the application or potentially execute malicious code by sending specially crafted RTP data that contains more frames than the software can handle. It affects versions prior to 2.17 of the PJSIP library, so using an updated version is crucial to prevent exploitation.

pjsippjsip
Theoretical
about 1 month agoMar 6, 2026
CVE-2026-285465.5

This vulnerability allows an attacker to crash the scanning module of HarmonyOS, potentially making the system unavailable. To exploit this, the attacker needs to send specially crafted input to the module, which could happen if the device is connected to a malicious network or application.

huaweiharmonyos
Theoretical
about 1 month agoMar 5, 2026
CVE-2026-34394.9

This vulnerability allows a remote attacker to crash a SonicWall firewall, potentially disrupting network security and access. It requires the attacker to be authenticated, meaning they need valid credentials to exploit the flaw.

sonicwallsonicos
Exploit Available
about 1 month agoMar 4, 2026
CVE-2026-241039.8

This critical vulnerability allows an attacker to take control of the Tenda AC15 router by sending specially crafted data to a specific part of its firmware, potentially leading to unauthorized access or disruption of the device. To exploit this flaw, the attacker must be able to reach the router's web interface, which could be done if the device is exposed to the internet or if the attacker is on the same local network.

tendaac15 firmware
Exploit Available
about 1 month agoMar 3, 2026
CVE-2026-228919.8

An attacker can execute arbitrary code on a system by tricking a user into opening a specially crafted Intan CLP file using the vulnerable version of the libbiosig library. This vulnerability requires the attacker to deliver the malicious file to the target, making it essential for users to be cautious about the files they open.

libbiosig projectlibbiosig
Exploit Available
about 1 month agoMar 3, 2026
CVE-2026-207778.1

An attacker can execute arbitrary code on a system by tricking a user into opening a specially crafted .wft file using the affected version of the libbiosig library. This vulnerability occurs due to a flaw in how the library handles certain files, allowing the attacker to manipulate the program's memory.

libbiosig projectlibbiosig
Theoretical
about 1 month agoMar 3, 2026
CVE-2026-34634.8

This vulnerability allows an attacker to cause a heap-based buffer overflow, which can lead to unexpected behavior or crashes in the affected software. However, the attack can only be executed locally, meaning the attacker must have access to the system where the software is running.

Unknown
Exploit Available
about 1 month agoMar 3, 2026
CVE-2025-123457.4

An attacker can remotely exploit a vulnerability in the LLM-Claw software to cause a buffer overflow, which could allow them to take control of the affected system. This issue affects specific versions of the software, so it's crucial to apply the available patch to fix it.

Unknown
Exploit Available
about 1 month agoMar 3, 2026
CVE-2026-34074.8

This vulnerability allows an attacker to potentially crash the Yosys software or execute malicious code by exploiting a flaw in how it handles certain data, specifically through a buffer overflow. The attack can only be carried out on the local machine where Yosys is running, and while it has been publicly disclosed, it doesn't always occur reliably.

Unknown
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-34007.4

An attacker can remotely exploit a vulnerability in the Tenda AC15 router to execute arbitrary code by manipulating a specific setting, which can lead to a complete takeover of the device. This attack can be carried out without any special access requirements, making it particularly dangerous for users who haven't updated their firmware.

tendaac15 firmware
Exploit Available
about 1 month agoMar 2, 2026
CVE-2026-33997.4

An attacker can remotely exploit a vulnerability in the Tenda F453 router to execute arbitrary code by manipulating a specific input, which can lead to a complete system compromise. This attack requires no special access, making it particularly dangerous since the exploit is publicly available.

tendaf453 firmware
Exploit Available
about 1 month agoMar 1, 2026
CVE-2026-33987.4

This vulnerability allows an attacker to remotely crash the Tenda F453 router or potentially take control of it by exploiting a flaw in how it handles certain settings. The attacker needs to manipulate specific input related to the router's WAN settings, which could lead to a serious security breach.

tendaf453 firmware
Exploit Available
about 1 month agoMar 1, 2026
CVE-2026-33934.8

This vulnerability allows an attacker to execute malicious code on a system by exploiting a flaw in the audio file handling function, which can lead to a buffer overflow. However, the attacker must have local access to the system to carry out the attack, and the issue has been publicly disclosed but remains unaddressed by the developers.

Unknown
Exploit Available
about 1 month agoMar 1, 2026
CVE-2026-33807.4

An attacker can remotely exploit a vulnerability in the Tenda F453 router to execute arbitrary code by manipulating a specific input, which can lead to a complete takeover of the device. This requires no special access, making it a serious risk for anyone using this firmware version.

tendaf453 firmware
Exploit Available
about 1 month agoMar 1, 2026
Showing 21 to 40 of 104 results