No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Thu, 02 Apr 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability has been found in Cesanta Mongoose up to 7.20. This affects the function mg_tls_recv_cert of the file mongoose.c of the component TLS 1.3 Handler. Such manipulation of the argument pubkey leads to heap-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used. Upgrading to version 7.21 mitigates this issue. The name of the patch is 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1. It is advisable to upgrade the affected component. The vendor was contacted early, responded in a very professional manner and quickly released a fixed version of the affected product. | |
| Title | Cesanta Mongoose TLS 1.3 mongoose.c mg_tls_recv_cert heap-based overflow | |
| First Time appeared |
Cesanta
Cesanta mongoose |
|
| Weaknesses | CWE-119 CWE-122 |
|
| CPEs | cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cesanta
Cesanta mongoose |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-02T08:00:19.770Z
Reserved: 2026-03-31T14:45:47.381Z
Link: CVE-2026-5244
No data.
Status : Received
Published: 2026-04-02T08:16:28.683
Modified: 2026-04-02T08:16:28.683
Link: CVE-2026-5244
No data.
OpenCVE Enrichment
No data.