Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3392: NULL Pointer Dereference in FascinatedBox lily

0
Medium
VulnerabilityCVE-2026-3392cvecve-2026-3392
Published: Sun Mar 01 2026 (03/01/2026, 11:32:11 UTC)
Source: CVE Database V5
Vendor/Project: FascinatedBox
Product: lily

Description

CVE-2026-3392 is a medium severity vulnerability in FascinatedBox lily versions up to 2. 3, caused by a null pointer dereference in the eval_tree function within src/lily_emitter. c. The flaw can be triggered by local attackers with limited privileges, requiring no user interaction. Exploitation leads to a denial of service by crashing the application, but does not allow privilege escalation or remote code execution. Although a public exploit exists, no known widespread attacks have been reported. The vendor has not yet responded or issued a patch. Organizations using FascinatedBox lily in local environments should be aware of this issue and apply mitigations to prevent potential service disruptions.

AI-Powered Analysis

AILast updated: 03/01/2026, 11:55:24 UTC

Technical Analysis

CVE-2026-3392 identifies a null pointer dereference vulnerability in the FascinatedBox lily project, specifically affecting versions 2.0 through 2.3. The vulnerability resides in the eval_tree function of the src/lily_emitter.c source file. When this function processes certain crafted inputs or internal states, it attempts to dereference a null pointer, causing the application to crash. This flaw is exploitable only by local users with limited privileges, as it requires local execution access and no user interaction or authentication is necessary beyond local presence. The impact is primarily a denial of service (DoS) condition, as the application terminates unexpectedly. The vulnerability was responsibly disclosed via an issue report prior to public release, but the project maintainers have not yet issued a patch or response. The availability of a public exploit increases the risk of local DoS attacks, especially in multi-user or shared environments where lily is used. The CVSS v4.0 base score is 4.8, reflecting medium severity due to the limited attack vector and impact scope. No remote exploitation or privilege escalation is possible through this vulnerability. The lack of vendor response and patch availability means users must rely on workarounds or mitigations until an official fix is released.

Potential Impact

The primary impact of this vulnerability is denial of service through application crashes caused by null pointer dereference. Organizations using FascinatedBox lily in environments where multiple users have local access could face service interruptions or instability. This may affect development workflows, automated processes, or any systems relying on lily for code emission or compilation tasks. Since the vulnerability does not allow remote exploitation or privilege escalation, the risk is contained to local users who already have some access. However, in shared or multi-tenant systems, an attacker could disrupt services or cause downtime, potentially impacting productivity and operational continuity. The presence of a public exploit increases the likelihood of opportunistic attacks. The lack of a patch prolongs exposure, requiring organizations to implement compensating controls. Overall, the impact is moderate but could be significant in environments where lily is critical and local user access is common.

Mitigation Recommendations

To mitigate CVE-2026-3392, organizations should restrict local access to systems running FascinatedBox lily to trusted users only, minimizing the risk of exploitation by unprivileged local attackers. Employ strict access controls and monitoring on development or build servers where lily is installed. Consider running lily processes with the least privileges necessary and isolate them in containers or sandboxed environments to limit the blast radius of a crash. Until an official patch is released, users can implement application-level monitoring to detect crashes and automatically restart services to reduce downtime. Reviewing and sanitizing inputs or scripts processed by lily may help avoid triggering the vulnerable code path. Engage with the vendor or open-source maintainers to encourage timely patching. Additionally, maintain up-to-date backups and incident response plans to quickly recover from potential disruptions caused by exploitation attempts.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-28T17:03:52.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a425d832ffcdb8a21d5292

Added to database: 3/1/2026, 11:41:12 AM

Last enriched: 3/1/2026, 11:55:24 AM

Last updated: 3/1/2026, 9:01:54 PM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses