Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-2653: Heap-based Buffer Overflow in admesh

0
Medium
VulnerabilityCVE-2026-2653cvecve-2026-2653
Published: Wed Feb 18 2026 (02/18/2026, 11:02:07 UTC)
Source: CVE Database V5
Product: admesh

Description

A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.

AI-Powered Analysis

AILast updated: 02/18/2026, 11:29:49 UTC

Technical Analysis

CVE-2026-2653 identifies a heap-based buffer overflow vulnerability in the open-source software admesh, versions 0.98.0 through 0.98.5. The flaw resides in the stl_check_normal_vector function located in src/normals.c, which processes STL file normal vectors. Improper handling or manipulation of input data in this function leads to a heap buffer overflow, causing memory corruption. This vulnerability requires an attacker to have local access with low privileges, as the attack vector is local and no user interaction is necessary. The overflow could potentially allow an attacker to execute arbitrary code or cause a denial of service by crashing the application. The exploit code has been publicly released, increasing the risk of exploitation. However, the product is reportedly no longer maintained, and no official patches or updates are available to remediate the issue. The CVSS v4.0 score is 4.8 (medium severity), reflecting the limited attack vector and privileges required. The vulnerability impacts confidentiality, integrity, and availability to a limited extent due to the local access requirement and lack of network-based exploitation. Admesh is commonly used in 3D model processing and CAD workflows, particularly for STL files, which are prevalent in manufacturing and prototyping environments.

Potential Impact

For European organizations, the primary impact lies in environments where admesh is used for 3D model processing, such as manufacturing, engineering, and prototyping sectors. Exploitation could lead to unauthorized code execution or application crashes, potentially disrupting critical design or manufacturing workflows. Although remote exploitation is not feasible, insider threats or compromised local accounts could leverage this vulnerability to escalate privileges or disrupt operations. The lack of maintenance and absence of patches increase the risk of prolonged exposure. Disruptions could affect production timelines and intellectual property confidentiality if exploited. Given the niche usage of admesh, the overall impact is moderate but could be significant in organizations relying heavily on this tool for STL file validation and processing.

Mitigation Recommendations

Since no official patches are available due to the product's unmaintained status, European organizations should consider the following mitigations: 1) Restrict local access to systems running admesh to trusted personnel only, enforcing strict access controls and monitoring. 2) Employ application sandboxing or containerization to limit the impact of potential exploitation. 3) Replace admesh with actively maintained and patched alternatives for STL processing where feasible. 4) Implement host-based intrusion detection systems (HIDS) to detect anomalous behavior indicative of exploitation attempts. 5) Conduct regular audits of systems using admesh to identify and isolate vulnerable instances. 6) Educate local users about the risks of executing untrusted STL files or software components. 7) If continued use is necessary, consider code review or custom patching by internal security teams to mitigate the overflow. These steps go beyond generic advice by focusing on containment, replacement, and proactive monitoring tailored to the local attack vector and product status.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-18T06:30:08.519Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69959f5480d747be2063f039

Added to database: 2/18/2026, 11:15:32 AM

Last enriched: 2/18/2026, 11:29:49 AM

Last updated: 2/21/2026, 12:17:39 AM

Views: 24

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats