๐Ÿ” CVE Alert

CVE-2026-8836

CRITICAL 9.8

lwIP snmpv3 USM snmp_msg.c snmp_parse_inbound_frame stack-based overflow

CVSS Score
9.8
EPSS Score
0.0%
EPSS Percentile
0th

A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters results in stack-based buffer overflow. The attack may be initiated remotely. The patch is named 0c957ec03054eb6c8205e9c9d1d05d90ada3898c. It is suggested to install a patch to address this issue.

CWE CWE-121 CWE-119
Vendor n/a
Product lwip
Published May 18, 2026
Last Updated May 18, 2026
Stay Ahead of the Next One

Get instant alerts for n/a lwip

Be the first to know when new critical vulnerabilities affecting n/a lwip are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

CVSS v3 Breakdown

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H/E:X/RL:O/RC:C
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability

Affected Versions

n/a / lwIP
2.1.0 2.1.1 2.1.2 2.1.3 2.2.0 2.2.1

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
vuldb.com: https://vuldb.com/vuln/364474 vuldb.com: https://vuldb.com/vuln/364474/cti vuldb.com: https://vuldb.com/submit/829798 savannah.nongnu.org: https://savannah.nongnu.org/bugs/?68194 cgit.git.savannah.gnu.org: https://cgit.git.savannah.gnu.org/cgit/lwip.git/commit/?id=0c957ec03054eb6c8205e9c9d1d05d90ada3898c github.com: https://github.com/lwip-tcpip/lwip/commit/0c957ec03054eb6c8205e9c9d1d05d90ada3898c

Credits

๐Ÿ” 0rbitingZer0 (VulDB User)