CVE-2026-32696
Description
NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. In NanoMQ version 0.24.6, after enabling auth.http_auth (HTTP authentication), when a client connects to the broker using MQTT CONNECT without providing username/password, and the configuration params uses the placeholders %u / %P (e.g., username="%u", password="%P"), the HTTP request construction phase enters auth_http.c:set_data(). This results in calling strlen() on a NULL pointer, causing a SIGSEGV crash. This crash can be triggered remotely, resulting in a denial of service. This issue has been patched in version 0.24.7.
Affected products
1Patches
1c20aa27e5290Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
4- github.com/nanomq/NanoNNG/commit/c20aa27e5290bb480a5315099952480d35f37a8bnvdPatch
- github.com/nanomq/NanoNNG/pull/1394nvdIssue TrackingPatch
- github.com/nanomq/nanomq/security/advisories/GHSA-77f4-wvq8-mp3pnvdExploitVendor Advisory
- github.com/nanomq/nanomq/releases/tag/0.24.7nvdProductRelease Notes
News mentions
0No linked articles in our index yet.