No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 02 Apr 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was found in Cesanta Mongoose up to 7.20. This impacts the function handle_mdns_record of the file mongoose.c of the component mDNS Record Handler. Performing a manipulation of the argument buf results in stack-based buffer overflow. Remote exploitation of the attack is possible. A high degree of complexity is needed for the attack. The exploitability is said to be difficult. The exploit has been made public and could be used. Upgrading to version 7.21 will fix this issue. The patch is named 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. | |
| Title | Cesanta Mongoose mDNS Record mongoose.c handle_mdns_record stack-based overflow | |
| First Time appeared |
Cesanta
Cesanta mongoose |
|
| Weaknesses | CWE-119 CWE-121 |
|
| CPEs | cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cesanta
Cesanta mongoose |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-02T14:27:27.092Z
Reserved: 2026-03-31T14:45:52.658Z
Link: CVE-2026-5245
Updated: 2026-04-02T14:27:17.979Z
Status : Received
Published: 2026-04-02T10:16:17.443
Modified: 2026-04-02T10:16:17.443
Link: CVE-2026-5245
No data.
OpenCVE Enrichment
No data.