Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-33847: CWE-119 Improper Restriction of Operations within the Bounds of a Memory Buffer in linkingvision rapidvms

0
High
VulnerabilityCVE-2026-33847cvecve-2026-33847cwe-119
Published: Tue Mar 24 2026 (03/24/2026, 05:55:14 UTC)
Source: CVE Database V5
Vendor/Project: linkingvision
Product: rapidvms

Description

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms.This issue affects rapidvms: before PR#96.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 15:05:34 UTC

Technical Analysis

CVE-2026-33847 is a vulnerability classified under CWE-119, indicating an improper restriction of operations within the bounds of a memory buffer in the linkingvision rapidvms software. This flaw exists in versions prior to PR#96 and allows an attacker with local access to perform operations that exceed the intended memory buffer limits, potentially causing memory corruption. The vulnerability's CVSS 3.1 score is 7.8, reflecting high severity due to its impact on confidentiality, integrity, and availability. The attack vector is local, meaning the attacker must have access to the system, but no privileges are required, and the attack complexity is low. User interaction is necessary, which might involve tricking a user into performing an action that triggers the vulnerability. Exploitation could allow an attacker to execute arbitrary code, escalate privileges, or cause denial of service by crashing the application or system. Although no known exploits are currently reported in the wild, the absence of patches at the time of publication increases the urgency for mitigation. The vulnerability affects rapidvms, a video management system used in surveillance and security contexts, making the potential impact significant in environments relying on this software for critical monitoring functions.

Potential Impact

The vulnerability poses a high risk to organizations using linkingvision rapidvms, especially those in security-sensitive sectors such as surveillance, critical infrastructure, and government facilities. Exploitation could lead to unauthorized code execution, data breaches, system crashes, and loss of monitoring capabilities. This could result in compromised physical security, exposure of sensitive video feeds, and disruption of security operations. The requirement for local access limits remote exploitation but does not eliminate risk in environments where multiple users have local system access or where attackers can gain local footholds through other means. The high impact on confidentiality, integrity, and availability underscores the critical nature of this vulnerability. Organizations may face operational downtime, regulatory penalties, and reputational damage if exploited.

Mitigation Recommendations

1. Immediately restrict local access to systems running rapidvms to trusted personnel only, minimizing the risk of local exploitation. 2. Monitor and audit local user activities to detect any suspicious behavior that could indicate exploitation attempts. 3. Implement application whitelisting and endpoint protection solutions to prevent unauthorized code execution. 4. Once available, apply the official patch or update from linkingvision addressing PR#96 without delay. 5. If patching is not immediately possible, consider isolating affected systems from less trusted networks and users. 6. Conduct regular memory and application behavior monitoring to detect anomalies indicative of buffer overflow exploitation. 7. Educate users about the risks of interacting with untrusted inputs or performing unexpected actions on the system. 8. Employ network segmentation to limit lateral movement if an attacker gains local access. 9. Engage with linkingvision support or security advisories for updates and recommended best practices specific to rapidvms.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GovTech CSG
Date Reserved
2026-03-24T05:46:40.229Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69c2a3a3f4197a8e3b3ed956

Added to database: 3/24/2026, 2:45:55 PM

Last enriched: 3/24/2026, 3:05:34 PM

Last updated: 3/26/2026, 5:28:48 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses