Buffer Overflow

Buffer Overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially allowing attackers to overwrite adjacent memory and execute arbitrary code.

Total CVEs

104

Typical Severity

CRITICAL

Category

Execution

Understanding Buffer Overflow

Detailed information about this vulnerability type.

How to Identify

  • Review security advisories
  • Perform regular security testing

Prevention Best Practices

  • Follow security best practices
  • Keep systems updated

Buffer Overflow CVEs (104)

DescriptionVendor / ProductExploit Status
CVE-2026-29587.4

An attacker can remotely exploit a vulnerability in the D-Link DWR-M960 router to execute arbitrary code by causing a buffer overflow, which could allow them to take control of the device. This attack requires the attacker to send specially crafted data to the router's firmware, making it critical to update the device as soon as possible to prevent exploitation.

dlinkdwr-m960 firmware
Exploit Available
about 1 month agoFeb 23, 2026
CVE-2026-29357.3

This vulnerability allows an attacker to remotely execute code on the UTT HiPER 810G firmware by exploiting a flaw in how the device handles certain input, potentially leading to a complete system compromise. The attacker needs to manipulate a specific argument in a configuration file, and public exploit code is already available, making it easier for malicious actors to take advantage of this weakness.

utt810g firmware
Exploit Available
about 1 month agoFeb 22, 2026
CVE-2026-29305.3

This vulnerability allows an attacker to remotely execute code on Tenda A18 routers by exploiting a flaw in the file upload function, which can lead to a stack-based buffer overflow. To successfully carry out the attack, the attacker needs to manipulate specific input parameters, and there are already publicly available methods to exploit this weakness.

tendaa18 firmware
Exploit Available
about 1 month agoFeb 22, 2026
CVE-2026-29057.4

An attacker can remotely exploit a flaw in the Tenda HG9 router's wireless settings to execute malicious code by sending specially crafted data, potentially taking control of the device. This vulnerability requires no special access or authentication, making it particularly dangerous.

tendahg9 firmware
Exploit Available
about 1 month agoFeb 22, 2026
CVE-2026-29047.4

This vulnerability allows an attacker to remotely execute malicious code on the UTT HiPER 810G device by exploiting a flaw in its configuration file handling, which can lead to a buffer overflow. The attacker needs to manipulate specific input to trigger this issue, making it a serious risk for anyone using this firmware version.

utt810g firmware
Exploit Available
about 1 month agoFeb 22, 2026
CVE-2026-28867.4

An attacker can remotely exploit a flaw in the Tenda A21 router's firmware to overwrite memory by sending a specially crafted device name, which could lead to unauthorized access or control of the device. This vulnerability is serious because it can be easily triggered without needing physical access to the router.

tendaa21 firmware
Exploit Available
about 1 month agoFeb 21, 2026
CVE-2026-28857.4

An attacker can remotely exploit a flaw in the D-Link DWR-M960 router's firmware to cause a stack-based buffer overflow, potentially allowing them to execute malicious code on the device. This vulnerability requires the attacker to manipulate a specific URL parameter, making it relatively easy to exploit if the router is accessible over the internet.

dlinkdwr-m960 firmware
Exploit Available
about 1 month agoFeb 21, 2026
CVE-2026-28847.4

This vulnerability allows an attacker to remotely take control of the D-Link DWR-M960 router by exploiting a flaw in its WAN settings, potentially leading to unauthorized access or manipulation of the device. The attack can be executed easily since the exploit is publicly available, meaning no special skills are needed to carry it out.

dlinkdwr-m960 firmware
Exploit Available
about 1 month agoFeb 21, 2026
CVE-2026-28837.4

An attacker can remotely exploit a vulnerability in the D-Link DWR-M960 router to execute a stack-based buffer overflow, potentially allowing them to take control of the device. This attack requires the attacker to manipulate a specific URL parameter, making it accessible to anyone who can reach the router over the internet.

dlinkdwr-m960 firmware
Exploit Available
about 1 month agoFeb 21, 2026
CVE-2026-28827.4

This vulnerability allows an attacker to remotely execute malicious code on the D-Link DWR-M960 router by exploiting a flaw in its firmware that leads to a stack-based buffer overflow. The attacker needs to manipulate a specific URL parameter, and since the exploit is publicly available, it poses a significant risk to users who haven't updated their devices.

dlinkdwr-m960 firmware
Exploit Available
about 1 month agoFeb 21, 2026
CVE-2026-28817.4

This vulnerability allows an attacker to remotely execute malicious code on the D-Link DWR-M960 router by exploiting a flaw in its firewall configuration settings. The attacker needs to send specially crafted data to the router, which can lead to a serious security breach.

dlinkdwr-m960 firmware
Exploit Available
about 1 month agoFeb 21, 2026
CVE-2026-28777.4

An attacker can remotely exploit a flaw in the Tenda A18 firmware to execute malicious code by overflowing a buffer when sending specially crafted data to the device's Wi-Fi settings. This vulnerability requires no physical access to the device, making it a serious risk for anyone using this router model.

tendaa18 firmware
Exploit Available
about 1 month agoFeb 21, 2026
CVE-2026-28767.4

An attacker can remotely exploit a vulnerability in the Tenda A18 router to execute arbitrary code by sending specially crafted data that causes a buffer overflow. This requires the attacker to have access to the router's settings, specifically through the function that manages MAC address filtering.

tendaa18 firmware
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-28747.4

An attacker can remotely exploit a flaw in the Tenda A21 router's firmware to gain control of the device by manipulating the Wi-Fi network name (SSID), potentially allowing them to execute harmful code. This vulnerability requires no special access, making it particularly dangerous for users who haven't updated their firmware.

tendaa21 firmware
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-28737.4

An attacker can remotely exploit a vulnerability in the Tenda A21 router to execute malicious code by manipulating specific settings related to scheduled Wi-Fi access, which can lead to a crash or unauthorized control of the device. This attack requires no special access, making it a significant risk for anyone using this router firmware version.

tendaa21 firmware
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-28727.4

An attacker can remotely exploit a vulnerability in the Tenda A21 router to execute arbitrary code by manipulating the device name during MAC filtering configuration, potentially taking control of the device. This requires the attacker to send specially crafted data to the router, making it a serious risk for anyone using this firmware version.

tendaa21 firmware
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-28717.4

This vulnerability allows an attacker to remotely execute malicious code on Tenda A21 routers by exploiting a flaw in the way the device handles certain input, leading to a stack-based buffer overflow. To successfully carry out the attack, the attacker needs to send specially crafted data to the router's configuration interface.

tendaa21 firmware
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-28707.4

This vulnerability allows an attacker to remotely execute code on Tenda A21 routers by exploiting a flaw in the firmware that leads to a stack-based buffer overflow. The attacker just needs to send specially crafted data to the device, making it a serious risk for anyone using the affected firmware version.

tendaa21 firmware
Exploit Available
about 2 months agoFeb 21, 2026
CVE-2026-26534.8

This vulnerability allows an attacker to execute arbitrary code on a system running an outdated version of admesh by exploiting a flaw in how the software handles certain data, specifically through a heap-based buffer overflow. The attacker needs to have local access to the system to carry out the attack, and since the software is not actively maintained, it may be more vulnerable to exploitation.

admesh projectadmesh
Exploit Available
about 2 months agoFeb 18, 2026
CVE-2026-267368.8

This vulnerability allows an attacker to execute arbitrary code on the TOTOLINK A3002RU router, potentially taking full control of the device. It occurs when the router processes a specially crafted input related to IPv6 settings, meaning an attacker needs to have access to the router's configuration interface to exploit it.

totolinka3002ru firmware
Exploit Available
about 2 months agoFeb 17, 2026
Showing 61 to 80 of 104 results