๐Ÿ” CVE Alert

CVE-2026-5245

MEDIUM 5.6

Cesanta Mongoose mDNS Record mongoose.c handle_mdns_record stack-based overflow

CVSS Score
5.6
EPSS Score
0.1%
EPSS Percentile
18th

A vulnerability was found in Cesanta Mongoose up to 7.20. This impacts the function handle_mdns_record of the file mongoose.c of the component mDNS Record Handler. Performing a manipulation of the argument buf results in stack-based buffer overflow. Remote exploitation of the attack is possible. A high degree of complexity is needed for the attack. The exploitability is said to be difficult. The exploit has been made public and could be used. Upgrading to version 7.21 will fix this issue. The patch is named 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.

CWE CWE-121 CWE-119
Vendor cesanta
Product mongoose
Published Apr 2, 2026
Last Updated Apr 2, 2026
Stay Ahead of the Next One

Get instant alerts for cesanta mongoose

Be the first to know when new medium vulnerabilities affecting cesanta mongoose are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

Cesanta / Mongoose
7.0 7.1 7.2 7.3 7.4 7.5 7.6 7.7 7.8 7.9 7.10 7.11 7.12 7.13 7.14 7.15 7.16 7.17 7.18 7.19 7.20

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/354826 vuldb.com: https://vuldb.com/vuln/354826/cti vuldb.com: https://vuldb.com/submit/770103 github.com: https://github.com/cesanta/mongoose/commit/0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1 github.com: https://github.com/cesanta/mongoose/releases/tag/7.21 github.com: https://github.com/cesanta/mongoose/

Credits

๐Ÿ” the_evilsocket (VulDB User) VulDB CNA Team