๐Ÿ” CVE Alert

CVE-2026-42996

UNKNOWN 0.0
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th

JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp.

CWE CWE-121
Vendor js8call
Product js8call
Published May 1, 2026
Last Updated May 1, 2026
Stay Ahead of the Next One

Get instant alerts for js8call js8call

Be the first to know when new unknown vulnerabilities affecting js8call js8call are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

JS8Call / JS8Call
0 โ‰ค 2.3.1
JS8Call-improved / JS8Call-improved
0 < 3.0

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/JS8Call-improved/JS8Call-improved/security/advisories/GHSA-98hp-pjp7-w62x amateur-radio-resources.sourceforge.io: https://amateur-radio-resources.sourceforge.io/PDF/JS8APRS.pdf github.com: https://github.com/js8call/js8call/blob/fd721e8b67eed84cb3c09d018205ab9a53e1a8b1/APRSISClient.cpp#L89-L102