Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-8836: Stack-based Buffer Overflow in lwIP

0
Critical
VulnerabilityCVE-2026-8836cvecve-2026-8836
Published: Mon May 18 2026 (05/18/2026, 18:45:12 UTC)
Source: CVE Database V5
Product: lwIP

Description

A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters results in stack-based buffer overflow. The attack may be initiated remotely. The patch is named 0c957ec03054eb6c8205e9c9d1d05d90ada3898c. It is suggested to install a patch to address this issue.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 05/18/2026, 19:21:37 UTC

Technical Analysis

This vulnerability in lwIP up to version 2.2.1 involves a stack-based buffer overflow in the snmp_parse_inbound_frame function of the SNMPv3 USM Handler (src/apps/snmp/snmp_msg.c). Manipulating the msgAuthenticationParameters argument can cause the overflow, potentially allowing remote attackers to execute arbitrary code or cause denial of service. The vulnerability is remotely exploitable without authentication or user interaction. The issue is tracked as CVE-2026-8836 with a CVSS 4.0 score of 9.3 (critical). A patch commit (0c957ec03054eb6c8205e9c9d1d05d90ada3898c) has been identified, though no official vendor advisory or remediation level is provided in the data.

Potential Impact

Successful exploitation can lead to remote code execution or denial of service due to a stack-based buffer overflow in a widely used network protocol stack. The vulnerability requires no privileges or user interaction, increasing its severity. No known exploits have been reported in the wild yet.

Mitigation Recommendations

A patch identified by commit 0c957ec03054eb6c8205e9c9d1d05d90ada3898c is suggested to address this vulnerability. Since no official vendor advisory or remediation level is provided, users should apply this patch or upgrade to a version of lwIP that includes this fix as soon as it becomes available. Patch status is not yet confirmed by an official advisory — check the vendor or project repository for the latest remediation guidance.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulDB
Date Reserved
2026-05-18T14:20:09.110Z
Cvss Version
4.0
State
PUBLISHED
Remediation Level
null

Threat ID: 6a0b633fec166c07b0e6173b

Added to database: 5/18/2026, 7:06:39 PM

Last enriched: 5/18/2026, 7:21:37 PM

Last updated: 5/18/2026, 8:17:19 PM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses