Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs

0
Medium
VulnerabilityCVE-2026-0821cvecve-2026-0821
Published: Sat Jan 10 2026 (01/10/2026, 13:02:07 UTC)
Source: CVE Database V5
Vendor/Project: quickjs-ng
Product: quickjs

Description

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

AI-Powered Analysis

AILast updated: 01/10/2026, 13:30:37 UTC

Technical Analysis

CVE-2026-0821 identifies a heap-based buffer overflow vulnerability in the quickjs-ng quickjs JavaScript engine, specifically in the js_typed_array_constructor function of quickjs.c. This vulnerability affects all versions up to and including 0.11.0. The flaw arises from improper handling of typed array construction, allowing an attacker to manipulate inputs to cause a heap overflow. This can lead to arbitrary code execution, memory corruption, or denial of service. The vulnerability is remotely exploitable without requiring any authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector (AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P) reflects network attack vector, low attack complexity, no privileges or user interaction needed, and partial impacts on confidentiality, integrity, and availability. Although no exploits are currently known in the wild, the vulnerability has been publicly disclosed, and a patch identified by commit c5d80831e51e48a83eab16ea867be87f091783c5 is available to remediate the issue. Quickjs-ng quickjs is commonly embedded in IoT devices, web applications, and other software requiring lightweight JavaScript execution, making the vulnerability relevant to a broad range of applications. The vulnerability’s exploitation could allow attackers to execute arbitrary code remotely, potentially compromising affected systems or causing service disruptions.

Potential Impact

For European organizations, the impact of CVE-2026-0821 can be significant, especially for those relying on quickjs-ng quickjs in embedded systems, IoT devices, or web-facing applications. Successful exploitation could lead to unauthorized code execution, data breaches, or denial of service, affecting confidentiality, integrity, and availability of critical systems. Industries such as manufacturing, telecommunications, and smart infrastructure, which increasingly integrate JavaScript engines like quickjs for automation and control, are particularly vulnerable. The remote exploitability without authentication increases the attack surface, potentially allowing attackers to compromise devices or services at scale. This could disrupt operations, lead to data loss, or enable lateral movement within networks. Given the medium CVSS score and partial impact on security properties, organizations should treat this vulnerability seriously to prevent exploitation that could escalate into more severe incidents.

Mitigation Recommendations

To mitigate CVE-2026-0821, organizations should immediately apply the official patch identified by commit c5d80831e51e48a83eab16ea867be87f091783c5 to all affected versions of quickjs-ng quickjs up to 0.11.0. Additionally, conduct a thorough inventory of all systems and applications using quickjs to ensure no vulnerable instances remain. Implement network segmentation and strict access controls around devices running quickjs to limit exposure. Employ runtime application self-protection (RASP) or behavior-based anomaly detection to identify suspicious activity indicative of exploitation attempts. For IoT and embedded devices, coordinate with vendors to ensure firmware updates include the patch. Regularly monitor threat intelligence feeds for emerging exploits targeting this vulnerability. Finally, consider employing application whitelisting and sandboxing techniques to reduce the impact of potential exploitation.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-09T18:24:17.150Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69625120f2400df44e458d90

Added to database: 1/10/2026, 1:16:16 PM

Last enriched: 1/10/2026, 1:30:37 PM

Last updated: 1/11/2026, 5:58:37 AM

Views: 21

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats