Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-3392: NULL Pointer Dereference in FascinatedBox lily

0
Medium
VulnerabilityCVE-2026-3392cvecve-2026-3392
Published: Sun Mar 01 2026 (03/01/2026, 11:32:11 UTC)
Source: CVE Database V5
Vendor/Project: FascinatedBox
Product: lily

Description

A weakness has been identified in FascinatedBox lily up to 2.3. The affected element is the function eval_tree of the file src/lily_emitter.c. This manipulation causes null pointer dereference. The attack is restricted to local execution. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/09/2026, 01:22:41 UTC

Technical Analysis

CVE-2026-3392 identifies a NULL pointer dereference vulnerability in FascinatedBox lily, specifically in the eval_tree function of the src/lily_emitter.c source file. This flaw occurs when the function improperly handles certain inputs or states, leading to dereferencing a NULL pointer, which causes the application to crash or terminate unexpectedly. The vulnerability affects versions 2.0 through 2.3 of the lily product. Exploitation is limited to local attackers with low privileges, requiring no user interaction. The vulnerability does not impact confidentiality or integrity but can cause denial of service by crashing the application or process. The issue was responsibly disclosed to the project maintainers, but no patch or response has been provided yet. A proof-of-concept exploit has been publicly released, increasing the risk of local exploitation. The CVSS v4.0 base score is 4.8, reflecting the medium severity due to local attack vector and limited impact scope.

Potential Impact

The primary impact of this vulnerability is a denial of service condition caused by application crashes due to NULL pointer dereference. Organizations using FascinatedBox lily in critical local environments may experience service interruptions or instability, potentially affecting development or runtime environments relying on this software. Since exploitation requires local access with low privileges, remote attackers cannot exploit this vulnerability directly. However, insider threats or attackers who have gained limited local access could leverage this flaw to disrupt services. The vulnerability does not expose sensitive data or allow privilege escalation, limiting its impact to availability concerns. The public availability of an exploit increases the risk of opportunistic attacks in environments where lily is deployed.

Mitigation Recommendations

To mitigate this vulnerability, organizations should implement strict access controls to limit local access to systems running FascinatedBox lily, ensuring only trusted users can execute or interact with the software. Monitoring and alerting for unexpected crashes or application restarts can help detect exploitation attempts. Since no official patch is available yet, consider applying temporary workarounds such as running lily in isolated environments or containers to contain potential crashes. Engage with the vendor or project maintainers to obtain updates or patches as they become available. Additionally, review and harden local user permissions and audit local activity to reduce the risk of exploitation. Regularly update to newer versions once a fix is released.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-02-28T17:03:52.364Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a425d832ffcdb8a21d5292

Added to database: 3/1/2026, 11:41:12 AM

Last enriched: 3/9/2026, 1:22:41 AM

Last updated: 4/15/2026, 4:52:00 PM

Views: 134

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses