Buffer Overflow
Buffer Overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially allowing attackers to overwrite adjacent memory and execute arbitrary code.
104
CRITICAL
Execution
Understanding Buffer Overflow
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Buffer Overflow CVEs (104)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-3379 | 7.4 | An attacker can remotely exploit a vulnerability in the Tenda F453 router to execute malicious code by manipulating a specific function, which can lead to a crash or unauthorized access to the device. This requires the attacker to send specially crafted requests to the router's firmware without needing physical access. | tendaf453 firmware | Exploit Available | about 1 month agoMar 1, 2026 |
| CVE-2026-3378 | 7.4 | An attacker can remotely exploit a flaw in the Tenda F453 router's firmware to cause a buffer overflow, potentially allowing them to take control of the device. This vulnerability requires the attacker to manipulate specific settings related to quality of service (QoS) in the router's configuration. | tendaf453 firmware | Exploit Available | about 1 month agoMar 1, 2026 |
| CVE-2026-3377 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on the Tenda F453 router by exploiting a flaw in the way it handles certain input, which can lead to a buffer overflow. To be successful, the attacker needs to manipulate specific data sent to the router's SafeUrlFilter function. | tendaf453 firmware | Exploit Available | about 1 month agoMar 1, 2026 |
| CVE-2026-3376 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on the Tenda F453 router by exploiting a flaw in the way it handles certain input, leading to a buffer overflow. The attacker can take advantage of this issue without needing physical access to the device, making it a serious risk for users. | tendaf453 firmware | Exploit Available | about 1 month agoFeb 28, 2026 |
| CVE-2026-23750 | 7.2 | An attacker can send specially crafted data to a vulnerable device, causing it to crash or potentially corrupt its memory, which could lead to unauthorized access or control. This requires the attacker to be within range of the device and able to communicate with it over Bluetooth. | Unknown | Theoretical | about 1 month agoFeb 26, 2026 |
| CVE-2026-23747 | 6.3 | An attacker can crash the Golioth Firmware SDK by sending oversized data to it, which can lead to a denial of service. This vulnerability can be exploited if the attacker controls the server or is in a position to intercept and manipulate the data being sent to the device. | Unknown | Exploit Available | about 1 month agoFeb 26, 2026 |
| CVE-2026-3169 | 7.4 | This vulnerability allows an attacker to remotely take control of the Tenda F453 router by exploiting a flaw in its email filtering function, which can lead to a buffer overflow. The attacker needs to send specially crafted requests to the router, making it possible for them to execute malicious code. | tendaf453 firmware | Exploit Available | about 1 month agoFeb 25, 2026 |
| CVE-2026-3168 | 7.4 | An attacker can remotely exploit a flaw in the Tenda F453 router's firmware to cause a buffer overflow, potentially allowing them to take control of the device. This vulnerability can be triggered by manipulating specific settings in the router's configuration, making it easy for attackers to launch an attack if they know how to exploit it. | tendaf453 firmware | Exploit Available | about 1 month agoFeb 25, 2026 |
| CVE-2026-3167 | 7.4 | An attacker can remotely exploit a vulnerability in Tenda F453 firmware to cause a buffer overflow, potentially allowing them to execute arbitrary code on the device. This requires the attacker to manipulate a specific argument in a web request, making it relatively easy for them to launch an attack. | tendaf453 firmware | Exploit Available | about 1 month agoFeb 25, 2026 |
| CVE-2026-3166 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on the Tenda F453 router by exploiting a buffer overflow in its firmware. The attacker can do this by manipulating specific input, and since the exploit is publicly available, it poses a significant risk to users who haven't updated their devices. | tendaf453 firmware | Exploit Available | about 1 month agoFeb 25, 2026 |
| CVE-2026-3016 | 7.4 | This vulnerability allows an attacker to remotely take control of the UTT HiPER 810G device by exploiting a flaw in how it handles data, potentially leading to unauthorized access or system crashes. The attacker can exploit this issue if they can send specially crafted data to the device, making it a serious risk for users running affected firmware versions. | utt810g firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-3015 | 7.4 | An attacker can remotely exploit a flaw in the UTT HiPER 810G firmware to execute arbitrary code by manipulating a specific input, which can lead to a buffer overflow. This vulnerability affects versions up to 1.7.7-171114 and could allow the attacker to take control of the device if they can send a specially crafted request. | utt810g firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2025-14905 | 7.2 | An attacker can exploit a flaw in the 389-ds-base server to potentially take control of the system or crash it, especially when processing a large number of alias strings. This happens because the server miscalculates memory size, leading to a situation where it can be tricked into running harmful code or becoming unresponsive. | Unknown | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2025-69700 | 7.5 | This vulnerability allows an attacker to execute arbitrary code on the Tenda FH1203 router by exploiting a flaw in a specific function that handles client priority settings. To take advantage of this, the attacker must have access to the router's web interface, which typically requires being on the same network. | tendafh1203 firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-2981 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on UTT HiPER 810G devices by exploiting a buffer overflow in a specific function. It affects firmware versions up to 1.7.7-1711, and the attacker can manipulate input data to trigger the exploit. | utt810g firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-2980 | 7.3 | An attacker can remotely exploit a vulnerability in UTT HiPER 810G firmware to execute arbitrary code by manipulating a password input, which causes a buffer overflow. This issue affects versions up to 1.7.7-1711 and could allow the attacker to take control of the device. | utt810g firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-2962 | 7.4 | An attacker can remotely exploit a vulnerability in the D-Link DWR-M960 router to execute arbitrary code by sending specially crafted data that causes a buffer overflow. This means they could potentially take control of the device if it is running the affected firmware version. | dlinkdwr-m960 firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-2961 | 7.4 | This vulnerability allows an attacker to remotely execute malicious code on the D-Link DWR-M960 router by exploiting a flaw in its VPN configuration setup. The attacker needs to manipulate a specific part of the router's software, which could lead to unauthorized access and control over the device. | dlinkdwr-m960 firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-2960 | 7.4 | This vulnerability allows an attacker to remotely execute code on the D-Link DWR-M960 router by exploiting a flaw in its firmware, which can lead to a crash or unauthorized access. The attacker needs to manipulate a specific URL parameter to trigger the issue, making it a significant risk for users of this device. | dlinkdwr-m960 firmware | Exploit Available | about 1 month agoFeb 23, 2026 |
| CVE-2026-2959 | 7.4 | This vulnerability allows an attacker to remotely take control of the D-Link DWR-M960 router by exploiting a flaw in its scheduling feature, which can lead to unauthorized access or manipulation of the device. The attacker needs to send specially crafted data to the router, making it possible for them to execute malicious code. | dlinkdwr-m960 firmware | Exploit Available | about 1 month agoFeb 23, 2026 |