Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27014: CWE-674: Uncontrolled Recursion in M2Team NanaZip

0
Medium
VulnerabilityCVE-2026-27014cvecve-2026-27014cwe-674
Published: Thu Feb 19 2026 (02/19/2026, 20:45:07 UTC)
Source: CVE Database V5
Vendor/Project: M2Team
Product: NanaZip

Description

CVE-2026-27014 is a medium severity vulnerability in M2Team's NanaZip archive software versions 5. 0. 1252. 0 up to but not including 6. 0. 1630. 0. It arises from uncontrolled recursion caused by deeply nested directories and circular NextOffset chains in the ROMFS archive parser, leading to infinite loops or stack overflows. Exploitation requires local access with low privileges and some user interaction, such as opening a crafted archive file. The vulnerability can cause application crashes or denial of service but does not directly lead to code execution or data compromise.

AI-Powered Analysis

AILast updated: 02/20/2026, 07:54:13 UTC

Technical Analysis

CVE-2026-27014 is a vulnerability classified under CWE-674 (Uncontrolled Recursion) affecting the NanaZip open-source file archiving tool developed by M2Team. Specifically, the flaw exists in the ROMFS archive parser component of NanaZip versions starting from 5.0.1252.0 up to 6.0.1630.0. The vulnerability manifests when the parser encounters circular NextOffset chains within an archive or deeply nested directory structures. These conditions cause the parser to enter an infinite loop or trigger unbounded recursion, resulting in a stack overflow. This uncontrolled recursion can crash the application, leading to denial of service. The vulnerability requires low privileges (local access) and some user interaction, such as opening a maliciously crafted archive file. The CVSS 4.0 base score is 5.1, reflecting medium severity, with attack vector local, low attack complexity, no privileges required beyond low, and user interaction needed. The vulnerability does not impact confidentiality, integrity, or availability beyond causing application crashes. No known exploits are reported in the wild as of the publication date. The issue was addressed and patched in NanaZip version 6.0.1630.0. Users of affected versions are advised to upgrade to the patched release to eliminate the risk.

Potential Impact

The primary impact of CVE-2026-27014 is denial of service due to application crashes caused by infinite loops or stack overflows when processing maliciously crafted ROMFS archives. For organizations, this can disrupt workflows that rely on NanaZip for archive extraction or management, potentially halting automated processes or user activities involving archive files. While the vulnerability does not allow remote code execution or data exfiltration, repeated exploitation could degrade system stability or availability, especially in environments where NanaZip is integrated into automated pipelines or used frequently by multiple users. The requirement for local access and user interaction limits the attack surface, but insider threats or phishing attacks delivering malicious archives could still exploit this flaw. Overall, the impact is moderate, affecting availability of the application but not leading to broader system compromise.

Mitigation Recommendations

To mitigate CVE-2026-27014, organizations should: 1) Upgrade NanaZip to version 6.0.1630.0 or later, where the vulnerability is patched. 2) Implement strict controls on archive files received from untrusted or unknown sources, including scanning and sandboxing before opening. 3) Educate users about the risks of opening archive files from suspicious emails or downloads to reduce the likelihood of user interaction with malicious files. 4) Where possible, restrict local user privileges to limit the ability to execute or open potentially harmful files. 5) Monitor application logs for crashes or unusual behavior related to archive processing that may indicate exploitation attempts. 6) Consider using alternative archive tools with robust security track records if NanaZip is not essential. These steps go beyond generic advice by focusing on patching, user awareness, and operational controls specific to archive handling.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-17T03:08:23.490Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699812af2c4d84f260aeb048

Added to database: 2/20/2026, 7:52:15 AM

Last enriched: 2/20/2026, 7:54:13 AM

Last updated: 2/20/2026, 12:17:37 PM

Views: 5

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats