Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-0821: Heap-based Buffer Overflow in quickjs-ng quickjs

0
Medium
VulnerabilityCVE-2026-0821cvecve-2026-0821
Published: Sat Jan 10 2026 (01/10/2026, 13:02:07 UTC)
Source: CVE Database V5
Vendor/Project: quickjs-ng
Product: quickjs

Description

A vulnerability was determined in quickjs-ng quickjs up to 0.11.0. This vulnerability affects the function js_typed_array_constructor of the file quickjs.c. Executing a manipulation can lead to heap-based buffer overflow. The attack may be launched remotely. The exploit has been publicly disclosed and may be utilized. This patch is called c5d80831e51e48a83eab16ea867be87f091783c5. A patch should be applied to remediate this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:44:03 UTC

Technical Analysis

CVE-2026-0821 identifies a heap-based buffer overflow vulnerability in the quickjs-ng quickjs JavaScript engine, specifically in the js_typed_array_constructor function located in quickjs.c. This vulnerability affects all versions up to and including 0.11.0. The flaw arises when manipulated input leads to improper handling of typed array construction, causing a buffer overflow on the heap. This memory corruption can be exploited remotely without any authentication or user interaction, making it a significant risk for exposed systems. The vulnerability could allow attackers to execute arbitrary code, crash the application, or cause denial of service, depending on the exploitation context. The CVSS 4.0 base score is 6.9, reflecting medium severity with network attack vector, low attack complexity, and no privileges or user interaction required. The vulnerability was publicly disclosed on January 10, 2026, and a patch identified by commit c5d80831e51e48a83eab16ea867be87f091783c5 has been released to address the issue. No known exploits are currently reported in the wild, but public disclosure increases the risk of exploitation attempts. Quickjs is often embedded in IoT devices, software applications, and other environments requiring lightweight JavaScript engines, broadening the scope of potentially affected systems.

Potential Impact

The heap-based buffer overflow in quickjs-ng quickjs can have serious consequences for organizations worldwide. Exploitation could lead to arbitrary code execution, allowing attackers to take control of affected systems, steal sensitive data, or disrupt services. Denial of service attacks could also be launched, impacting availability. Since the vulnerability can be exploited remotely without authentication or user interaction, exposed systems are at significant risk. This is particularly concerning for embedded devices, IoT products, and software platforms that integrate quickjs for scripting capabilities. Organizations relying on quickjs in critical infrastructure or consumer devices may face operational disruptions, data breaches, or reputational damage. The medium severity rating indicates a notable but not critical risk, yet the ease of exploitation and broad usage of quickjs warrant urgent attention to patching and mitigation.

Mitigation Recommendations

To mitigate CVE-2026-0821, organizations should promptly apply the official patch identified by commit c5d80831e51e48a83eab16ea867be87f091783c5 to all affected quickjs versions up to 0.11.0. If immediate patching is not feasible, consider isolating or restricting network access to systems running vulnerable quickjs versions to reduce exposure. Employ runtime protections such as heap memory protection mechanisms (e.g., ASLR, DEP) and enable compiler-based mitigations like stack canaries and bounds checking where possible. Conduct thorough code audits for any custom integrations of quickjs to identify and remediate unsafe usage patterns. Monitor network traffic and logs for anomalous behavior indicative of exploitation attempts targeting the js_typed_array_constructor function. Finally, maintain an inventory of all devices and software components using quickjs to ensure comprehensive coverage of remediation efforts.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-09T18:24:17.150Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69625120f2400df44e458d90

Added to database: 1/10/2026, 1:16:16 PM

Last enriched: 2/23/2026, 10:44:03 PM

Last updated: 3/25/2026, 9:19:43 AM

Views: 165

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses