CVE-2026-5245
Description
A vulnerability was found in Cesanta Mongoose up to 7.20. This impacts the function handle_mdns_record of the file mongoose.c of the component mDNS Record Handler. Performing a manipulation of the argument buf results in stack-based buffer overflow. Remote exploitation of the attack is possible. A high degree of complexity is needed for the attack. The exploitability is said to be difficult. The exploit has been made public and could be used. Upgrading to version 7.21 will fix this issue. The patch is named 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. You should upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product.
Affected products
1Patches
10d882f1b43ffVulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
5- github.com/cesanta/mongoose/commit/0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1nvdPatch
- vuldb.com/submit/770103nvdThird Party AdvisoryVDB Entry
- vuldb.com/vuln/354826nvdThird Party AdvisoryVDB Entry
- github.com/cesanta/mongoose/releases/tag/7.21nvdProductRelease Notes
- vuldb.com/vuln/354826/ctinvdPermissions RequiredVDB Entry
News mentions
0No linked articles in our index yet.