Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs

0
Medium
VulnerabilityCVE-2026-0821cvecve-2026-0821
Published: Sat Jan 10 2026 (01/10/2026, 13:02:07 UTC)
Source: CVE Database V5
Vendor/Project: quickjs-ng
Product: quickjs

Description

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

AI-Powered Analysis

AILast updated: 01/18/2026, 07:43:28 UTC

Technical Analysis

CVE-2026-0821 identifies a heap-based buffer overflow vulnerability in the quickjs-ng quickjs JavaScript engine, specifically within the js_typed_array_constructor function located in quickjs.c. This vulnerability affects all versions up to and including 0.11.0. The flaw arises from improper handling of typed array construction, where crafted input can cause the function to write beyond the allocated heap buffer boundaries. This memory corruption can lead to undefined behavior such as application crashes or arbitrary code execution. The vulnerability is remotely exploitable without requiring authentication or user interaction, increasing its risk profile. The attack vector is network-based, allowing attackers to send malicious payloads to vulnerable quickjs instances embedded in applications or devices. The vulnerability was publicly disclosed shortly after being reserved, and a patch identified by commit c5d80831e51e48a83eab16ea867be87f091783c5 is available to remediate the issue. Despite no known active exploitation in the wild, the public disclosure and ease of exploitation make timely patching critical. The CVSS 4.0 score of 6.9 reflects medium severity, with low complexity and no privileges or user interaction required, but limited impact on confidentiality, integrity, and availability. Quickjs is often used in embedded systems, IoT devices, and lightweight JavaScript environments, which may be deployed in various European industries.

Potential Impact

The heap-based buffer overflow in quickjs-ng quickjs can lead to arbitrary code execution or denial of service conditions, potentially compromising the confidentiality, integrity, and availability of affected systems. For European organizations, this poses a risk particularly in sectors relying on embedded systems, IoT devices, or applications that embed quickjs for scripting capabilities. Exploitation could allow attackers to execute malicious code remotely, leading to system takeover, data breaches, or disruption of critical services. The medium severity score indicates a moderate risk, but the lack of authentication and user interaction requirements increases the likelihood of exploitation. Industries such as manufacturing, telecommunications, and critical infrastructure in Europe that integrate quickjs in their technology stacks could face operational disruptions or security breaches if unpatched. Additionally, supply chain risks exist if third-party software or hardware vendors incorporate vulnerable quickjs versions. The absence of known exploits in the wild currently reduces immediate risk but does not eliminate the threat, especially given the public availability of the vulnerability details and patch.

Mitigation Recommendations

European organizations should immediately identify all instances of quickjs-ng quickjs in their environments, including embedded systems, IoT devices, and software applications. They must apply the official patch referenced by commit c5d80831e51e48a83eab16ea867be87f091783c5 to all affected versions up to 0.11.0. For systems where patching is not immediately feasible, implement network-level protections such as firewall rules to restrict access to services using quickjs, and deploy intrusion detection/prevention systems to monitor for suspicious payloads targeting the js_typed_array_constructor function. Conduct thorough code audits and penetration testing on applications embedding quickjs to detect potential exploitation attempts. Vendors and integrators should update their products to incorporate the patched quickjs version and communicate the urgency to customers. Additionally, implement runtime protections such as heap memory integrity checks and sandboxing to limit the impact of potential exploitation. Maintain up-to-date asset inventories to track vulnerable components and ensure rapid response to emerging threats related to this vulnerability.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-09T18:24:17.150Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69625120f2400df44e458d90

Added to database: 1/10/2026, 1:16:16 PM

Last enriched: 1/18/2026, 7:43:28 AM

Last updated: 2/7/2026, 3:23:49 PM

Views: 126

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats