๐Ÿ” CVE Alert

CVE-2026-40333

MEDIUM 6.1

libgphoto2 has OOB read in ptp_unpack_EOS_ImageFormat() and ptp_unpack_EOS_CustomFuncEx() due to missing length parameter in ptp-pack.c

CVSS Score
6.1
EPSS Score
0.0%
EPSS Percentile
0th

libgphoto2 is a camera access and control library. In versions up to and including 2.5.33, two functions in camlibs/ptp2/ptp-pack.c accept a data pointer but no length parameter, performing unbounded reads. Their callers in ptp_unpack_EOS_events() have xsize available but never pass it, leaving both functions unable to validate reads against the actual buffer boundary. Commit 1817ecead20c2aafa7549dac9619fe38f47b2f53 patches the issue.

CWE CWE-125
Vendor gphoto
Product libgphoto2
Published Apr 17, 2026
Stay Ahead of the Next One

Get instant alerts for gphoto libgphoto2

Be the first to know when new medium vulnerabilities affecting gphoto libgphoto2 are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:H
Attack Vector
Physical
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
High

Affected Versions

gphoto / libgphoto2
<= 2.5.33

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/gphoto/libgphoto2/security/advisories/GHSA-hq94-cp6h-3gjp github.com: https://github.com/gphoto/libgphoto2/commit/1817ecead20c2aafa7549dac9619fe38f47b2f53