Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-1109: Buffer Overflow in cijliu librtsp

0
Medium
VulnerabilityCVE-2026-1109cvecve-2026-1109
Published: Sun Jan 18 2026 (01/18/2026, 03:02:06 UTC)
Source: CVE Database V5
Vendor/Project: cijliu
Product: librtsp

Description

A vulnerability was detected in cijliu librtsp up to 2ec1a81ad65280568a0c7c16420d7c10fde13b04. The impacted element is the function rtsp_parse_request. The manipulation results in buffer overflow. Attacking locally is a requirement. This product takes the approach of rolling releases to provide continious delivery. Therefore, version details for affected and updated releases are not available. The vendor was contacted early about this disclosure but did not respond in any way.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/23/2026, 22:49:40 UTC

Technical Analysis

CVE-2026-1109 identifies a buffer overflow vulnerability in the rtsp_parse_request function of the cijliu librtsp library, specifically up to commit 2ec1a81ad65280568a0c7c16420d7c10fde13b04. The vulnerability arises from improper handling of input data during RTSP request parsing, allowing a local attacker with low privileges to overflow a buffer. This can lead to memory corruption, potentially enabling partial compromise of confidentiality, integrity, or availability of the affected system. The vulnerability requires local access, no user interaction, and no elevated privileges beyond low-level local permissions. The vendor uses a rolling release approach, complicating version tracking and patch availability; no official patch or response has been provided. The CVSS 4.8 score reflects the limited attack vector and partial impact. No known exploits have been reported in the wild, but the vulnerability remains a concern for environments embedding librtsp for RTSP streaming functionality. The lack of vendor engagement and patch availability increases risk for organizations relying on this library.

Potential Impact

The buffer overflow vulnerability could allow a local attacker to corrupt memory, potentially leading to denial of service or partial unauthorized access to sensitive information. While exploitation requires local access, the impact on confidentiality, integrity, and availability is partial but non-negligible. Systems running RTSP streaming services or media servers embedding librtsp may experience crashes or unexpected behavior, disrupting service availability. In environments where RTSP is used for surveillance, media delivery, or real-time streaming, this could degrade operational reliability. The absence of vendor patches and public exploits means the threat is currently theoretical but could be weaponized if combined with other vulnerabilities or privilege escalation techniques. Organizations with multi-user systems or shared hosting environments are at increased risk due to the local attack requirement.

Mitigation Recommendations

Organizations should first identify all instances of the cijliu librtsp library in their environments, particularly those handling RTSP streaming. Given the lack of official patches, consider applying manual code review and hardening around the rtsp_parse_request function to validate input lengths and prevent buffer overflows. Employ runtime protections such as Address Space Layout Randomization (ASLR), stack canaries, and memory protection mechanisms to mitigate exploitation impact. Restrict local access to trusted users only and monitor for unusual local activity that might indicate exploitation attempts. If possible, isolate RTSP services using librtsp in sandboxed or containerized environments to limit damage scope. Engage with the vendor or community for updates or unofficial patches. Finally, maintain robust system and application logging to detect anomalous behavior related to RTSP parsing.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-01-17T08:49:18.470Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 696c52f7d302b072d965579e

Added to database: 1/18/2026, 3:26:47 AM

Last enriched: 2/23/2026, 10:49:40 PM

Last updated: 3/25/2026, 5:40:12 AM

Views: 89

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses