VYPR
High severity7.2NVD Advisory· Published May 17, 2026· Updated May 18, 2026

CVE-2026-8764

CVE-2026-8764

Description

A security vulnerability has been detected in H3C Magic B3 up to 100R002. This affects the function UpdateWanParams of the file /goform/aspForm. Such manipulation of the argument param leads to buffer overflow. The attack may be performed from remote. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

Buffer overflow in H3C Magic B3 router's UpdateWanParams function via crafted param argument can lead to DoS or potential RCE.

Vulnerability

A buffer overflow vulnerability exists in the H3C Magic B3 router firmware version up to 100R002. The flaw is located in the UpdateWanParams function within the file /goform/aspForm. The function accepts a param argument but copies it into a fixed 64-byte destination buffer without verifying the length, despite an initial length restriction of 512 bytes. This inconsistency allows an attacker to overflow the buffer by sending a crafted input that exceeds the destination buffer size. [1]

Exploitation

An attacker can exploit this vulnerability remotely without authentication. By sending a crafted HTTP POST request to /goform/aspForm with an overly long param value, the attacker triggers the buffer overflow. The proof-of-concept (PoC) has been publicly disclosed, demonstrating the ease of exploitation. [1]

Impact

Successful exploitation can cause a denial of service (DoS) due to memory corruption. Under specific circumstances, the overflow may be leveraged to achieve remote code execution (RCE), potentially allowing the attacker to gain full control of the device. [1]

Mitigation

The vendor, H3C, was contacted but did not respond, and no official patch or fix has been released as of the publication date. Users should consider restricting network access to the router's web interface, monitoring for unusual activity, or replacing the device if possible. [1]

AI Insight generated on May 21, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

4

News mentions

0

No linked articles in our index yet.