CVE-2026-42996
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp.
| CWE | CWE-121 |
| Vendor | js8call |
| Product | js8call |
| Published | May 1, 2026 |
| Last Updated | May 1, 2026 |
Stay Ahead of the Next One
Get instant alerts for js8call js8call
Be the first to know when new unknown vulnerabilities affecting js8call js8call are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
JS8Call / JS8Call
0 โค 2.3.1
JS8Call-improved / JS8Call-improved
0 < 3.0
References
github.com: https://github.com/JS8Call-improved/JS8Call-improved/security/advisories/GHSA-98hp-pjp7-w62x amateur-radio-resources.sourceforge.io: https://amateur-radio-resources.sourceforge.io/PDF/JS8APRS.pdf github.com: https://github.com/js8call/js8call/blob/fd721e8b67eed84cb3c09d018205ab9a53e1a8b1/APRSISClient.cpp#L89-L102