Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0791: CWE-121: Stack-based Buffer Overflow in ALGO 8180 IP Audio Alerter

0
High
VulnerabilityCVE-2026-0791cvecve-2026-0791cwe-121
Published: Fri Jan 23 2026 (01/23/2026, 03:01:24 UTC)
Source: CVE Database V5
Vendor/Project: ALGO
Product: 8180 IP Audio Alerter

Description

CVE-2026-0791 is a high-severity stack-based buffer overflow vulnerability in the ALGO 8180 IP Audio Alerter device, specifically in the handling of the SIP INVITE Replaces header. This flaw allows remote attackers to execute arbitrary code without authentication by sending a specially crafted SIP INVITE request. The vulnerability arises from improper validation of user-supplied data length before copying it into a fixed-size stack buffer, leading to potential remote code execution. The CVSS score is 8. 1, indicating a significant risk to confidentiality, integrity, and availability. No known exploits are currently in the wild, and no patches have been published yet. European organizations using this device in critical communication infrastructure may face risks of device takeover or disruption. Mitigation should focus on network-level protections, strict SIP traffic filtering, and close monitoring until a vendor patch is available. Countries with higher adoption of ALGO devices and strategic reliance on IP audio alerting systems are at greater risk.

AI-Powered Analysis

AILast updated: 01/30/2026, 10:07:49 UTC

Technical Analysis

CVE-2026-0791 is a stack-based buffer overflow vulnerability identified in the ALGO 8180 IP Audio Alerter, a device used for IP-based audio alerting and paging. The vulnerability specifically exists in the processing of the SIP INVITE request's Replaces header, where the device fails to properly validate the length of user-supplied data before copying it into a fixed-length stack buffer. This lack of bounds checking allows an attacker to overflow the buffer, potentially overwriting the stack and enabling arbitrary code execution in the context of the device’s process. Exploitation requires no authentication or user interaction, making it remotely exploitable over the network by sending a crafted SIP INVITE message. The vulnerability is classified under CWE-121 (Stack-based Buffer Overflow) and has been assigned a CVSS v3.0 base score of 8.1, reflecting high impact on confidentiality, integrity, and availability. The attack vector is network-based with high attack complexity, but no privileges or user interaction are required. The vulnerability was reported by the Zero Day Initiative (ZDI) under the identifier ZDI-CAN-28300 and published on January 23, 2026. No patches or mitigations have been officially released by ALGO at the time of this report, and no known exploits have been observed in the wild. Given the device’s role in critical communication infrastructure, successful exploitation could lead to full device compromise, enabling attackers to manipulate audio alerts, disrupt communications, or pivot into internal networks.

Potential Impact

For European organizations, the impact of CVE-2026-0791 can be significant, especially for those relying on ALGO 8180 IP Audio Alerter devices in their physical security, emergency notification, or public address systems. Successful exploitation could allow attackers to execute arbitrary code remotely, leading to full device compromise. This could result in unauthorized manipulation or suppression of audio alerts, causing misinformation or failure to alert personnel during emergencies. Additionally, compromised devices could serve as footholds for lateral movement into enterprise networks, risking broader network intrusion and data breaches. The confidentiality of communications could be undermined, and the integrity and availability of alerting systems could be severely affected. Given the lack of authentication required for exploitation, attackers could operate from outside the organization’s perimeter. This vulnerability poses a direct threat to operational continuity and safety in environments such as transportation hubs, hospitals, corporate campuses, and government facilities across Europe.

Mitigation Recommendations

Until an official patch is released by ALGO, European organizations should implement the following specific mitigations: 1) Deploy network-level access controls to restrict SIP traffic to trusted sources only, using firewalls and SIP-aware intrusion prevention systems (IPS) to detect and block malformed INVITE requests containing suspicious Replaces headers. 2) Segment the network to isolate ALGO 8180 devices from general user and internet-facing networks, limiting exposure to untrusted traffic. 3) Monitor network traffic for unusual SIP INVITE patterns or anomalies that could indicate exploitation attempts. 4) Employ rate limiting on SIP requests to reduce the risk of exploitation through rapid repeated attempts. 5) Maintain an inventory of all ALGO 8180 devices and ensure firmware versions are tracked to apply patches promptly once available. 6) Engage with ALGO support channels to obtain early access to security updates or workarounds. 7) Consider temporary disabling or restricting SIP Replaces header processing if device configuration allows. 8) Conduct regular security assessments and penetration testing focused on VoIP and IP audio alerting infrastructure. These targeted actions go beyond generic advice by focusing on the specific protocol and device behavior involved in this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
zdi
Date Reserved
2026-01-08T22:55:46.514Z
Cvss Version
3.0
State
PUBLISHED

Threat ID: 6972e91b4623b1157cde3350

Added to database: 1/23/2026, 3:20:59 AM

Last enriched: 1/30/2026, 10:07:49 AM

Last updated: 2/6/2026, 1:22:43 AM

Views: 29

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats