CVE-2026-8836
lwIP snmpv3 USM snmp_msg.c snmp_parse_inbound_frame stack-based overflow
CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th
A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters results in stack-based buffer overflow. The attack may be initiated remotely. The patch is named 0c957ec03054eb6c8205e9c9d1d05d90ada3898c. It is suggested to install a patch to address this issue.
| CWE | CWE-121 CWE-119 |
| Vendor | n/a |
| Product | lwip |
| Published | May 18, 2026 |
| Last Updated | May 18, 2026 |
Stay Ahead of the Next One
Get instant alerts for n/a lwip
Be the first to know when new critical vulnerabilities affecting n/a lwip are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
CVSS v3 Breakdown
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:O/RC:C Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Affected Versions
n/a / lwIP
2.1.0 2.1.1 2.1.2 2.1.3 2.2.0 2.2.1
References
vuldb.com: https://vuldb.com/vuln/364474 vuldb.com: https://vuldb.com/vuln/364474/cti vuldb.com: https://vuldb.com/submit/829798 savannah.nongnu.org: https://savannah.nongnu.org/bugs/?68194 cgit.git.savannah.gnu.org: https://cgit.git.savannah.gnu.org/cgit/lwip.git/commit/?id=0c957ec03054eb6c8205e9c9d1d05d90ada3898c github.com: https://github.com/lwip-tcpip/lwip/commit/0c957ec03054eb6c8205e9c9d1d05d90ada3898c
Credits
๐ 0rbitingZer0 (VulDB User)