Buffer Overflow
Buffer Overflow vulnerabilities occur when a program writes more data to a buffer than it can hold, potentially allowing attackers to overwrite adjacent memory and execute arbitrary code.
104
CRITICAL
Execution
Understanding Buffer Overflow
Detailed information about this vulnerability type.
How to Identify
- •Review security advisories
- •Perform regular security testing
Prevention Best Practices
- ✓Follow security best practices
- ✓Keep systems updated
Buffer Overflow CVEs (104)
| Description | Vendor / Product | Exploit Status | |||
|---|---|---|---|---|---|
| CVE-2026-26732 | 8.8 | This vulnerability allows an attacker to execute malicious code on the TOTOLINK A3002RU router by sending specially crafted input through the vpnUser or vpnPassword fields. To exploit this, the attacker needs access to the router's web interface, which typically requires being on the same network. | totolinka3002ru firmware | Exploit Available | about 2 months agoFeb 17, 2026 |
| CVE-2026-26731 | 8.8 | This vulnerability allows an attacker to execute arbitrary code on the TOTOLINK A3002RU router by sending specially crafted data through the router name parameter. It requires the attacker to have access to the router's web interface, which could be exploited if the router is exposed to the internet or if an attacker is on the same local network. | totolinka3002ru firmware | Exploit Available | about 2 months agoFeb 17, 2026 |
| CVE-2026-2565 | 6.6 | This vulnerability allows an attacker to remotely crash the Wavlink WL-NU516U1 device or potentially take control of it by exploiting a flaw in how the device handles time zone settings. Although the attack is complex and difficult to execute, public exploit code is available, making it a real threat to unpatched devices. | wavlinkwl-nu516u1 firmware | Exploit Available | about 2 months agoFeb 16, 2026 |
| CVE-2026-2447 | 8.8 | This vulnerability allows an attacker to potentially execute malicious code on a user's system by exploiting a flaw in how Firefox and Thunderbird handle video data. It affects specific versions of these applications, so users need to ensure they are running the latest updates to stay protected. | mozillafirefox | Exploit Available | about 2 months agoFeb 16, 2026 |
| CVE-2025-32062 | 8.8 | An attacker can gain full control over the car's infotainment system by exploiting a flaw in the Bluetooth software, allowing them to run malicious code remotely. This vulnerability requires the attacker to send a specially crafted Bluetooth packet to the system while it is connected to the L2CAP channel. | Unknown | Theoretical | about 2 months agoFeb 15, 2026 |
| CVE-2025-32061 | 8.8 | An attacker can remotely take control of the car's infotainment system with full access by sending a specially crafted Bluetooth packet. This vulnerability affects certain Nissan Leaf models from 2020 and requires the attacker to be within Bluetooth range of the vehicle. | Unknown | Exploit Available | about 2 months agoFeb 15, 2026 |
| CVE-2025-32059 | 8.8 | An attacker can gain complete control over the car's infotainment system by exploiting a flaw in the Bluetooth software, allowing them to run malicious code remotely. This vulnerability requires the attacker to send a specially crafted Bluetooth packet to the system while it is connected. | Unknown | Exploit Available | about 2 months agoFeb 15, 2026 |
| CVE-2026-21870 | 5.5 | This vulnerability allows an attacker to crash the BACnet application by sending a specially crafted string that exceeds the buffer limit, leading to a stack overflow. The attacker needs to exploit the ubasic interpreter in specific versions of the BACnet Protocol Stack library, which improperly handles long strings, causing the application to terminate unexpectedly. | bacnetstackbacnet stack | Exploit Available | about 2 months agoFeb 13, 2026 |
| CVE-2025-70122 | 7.5 | This vulnerability allows remote attackers to crash the UPF component of free5GC, causing a denial of service by sending a specially crafted request that tricks the system into trying to use more memory than it can handle. To exploit this, the attacker needs to send a specific type of message that exceeds the expected size, leading to a system failure. | free5gcfree5gc | Theoretical | about 2 months agoFeb 13, 2026 |
| CVE-2025-70314 | 9.8 | This vulnerability allows an attacker to execute arbitrary code on the server by sending a specially crafted request that overflows a buffer related to the filename variable. The attacker needs to be able to send requests to the webfsd service, making it a serious risk for any exposed system running version 1.21. | ourwaywebfsd | Theoretical | about 2 months agoFeb 12, 2026 |
| CVE-2025-67433 | 0.0 | An attacker can send a specially crafted DATA packet to the Open TFTP Server, causing it to crash and become unavailable, resulting in a Denial of Service. This vulnerability occurs when the server processes requests and does not handle certain data correctly, but it requires the attacker to have network access to the server. | Unknown | Theoretical | about 2 months agoFeb 12, 2026 |
| CVE-2025-69807 | 7.5 | This vulnerability allows an attacker to crash the server by sending a specially crafted packet, leading to a denial of service. The attacker does not need to be authenticated, meaning they can exploit this from anywhere without needing any special access. | Unknown | Theoretical | about 2 months agoFeb 12, 2026 |
| CVE-2024-36600 | 8.4 | This vulnerability allows an attacker to run malicious code on a victim's system by tricking them into opening a specially crafted ISO 9660 image file. It affects libcdio version 2.2.0 and can be exploited if the attacker can get the victim to use this outdated version of the software. | gnulibcdio | Exploit Available | almost 2 years agoJun 14, 2024 |
| CVE-2023-52356 | 7.5 | An attacker can exploit a flaw in libtiff to crash applications by sending a specially crafted TIFF file, which can lead to a denial of service. This vulnerability occurs when the TIFFReadRGBATileExt() function processes the malicious file, causing the program to fail unexpectedly. | libtifflibtiff | Exploit Available | about 2 years agoJan 25, 2024 |
| CVE-2023-4911 | 7.8 | This vulnerability allows a local attacker to run their own code with higher privileges on a system by exploiting a flaw in how the system processes certain environment variables. To take advantage of this, the attacker needs to have access to run programs that have SUID permissions, which can give them elevated control over the system. | netappbootstrap os | Exploit Available | over 2 years agoOct 3, 2023 |
| CVE-2023-33009 | 9.8 | An attacker can exploit a critical vulnerability in certain Zyxel device firmware to crash the device or potentially take control of it remotely, without needing to log in. This affects multiple firmware versions, so if your device is running one of these versions, it’s crucial to update it immediately to protect against this risk. | zyxelatp100 firmware | Exploit Available | almost 3 years agoMay 24, 2023 |
| CVE-2022-45188 | 7.8 | This vulnerability allows an attacker to execute malicious code remotely, potentially gaining full control over affected systems like FreeBSD, which is used in TrueNAS. It occurs when a specially crafted .appl file is processed, making it crucial for systems running vulnerable versions of Netatalk to be updated or secured. | netatalknetatalk | Theoretical | over 3 years agoNov 12, 2022 |
| CVE-2019-10952 | 9.8 | An attacker can send a specially crafted web request to crash the CompactLogix 5370 controllers, making them unavailable, and potentially run malicious code on them. This vulnerability affects specific firmware versions and requires a cold restart to recover the device. | rockwellautomationcompactlogix 5370 l1 firmware | Exploit Available | almost 7 years agoMay 1, 2019 |
| CVE-2019-9928 | 8.8 | This vulnerability allows an attacker to run malicious code on a victim's system by sending a specially crafted response to a GStreamer application. It requires the victim to connect to a compromised RTSP server that exploits this flaw in GStreamer versions before 1.16.0. | gstreamergstreamer | Exploit Available | almost 7 years agoApr 24, 2019 |
| CVE-2018-5410 | 7.8 | An attacker can exploit a flaw in the dokan1.sys driver to send harmful data that could crash the system or allow them to run malicious code with high privileges. This vulnerability affects specific versions of the software and requires the attacker to create a device handle to access the driver. | dokan-devdokany | Exploit Available | over 7 years agoJan 7, 2019 |