Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 01 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 01 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zephyrproject
Zephyrproject zephyr |
|
| CPEs | cpe:2.3:o:zephyrproject:zephyr:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Zephyrproject
Zephyrproject zephyr |
Mon, 30 Mar 2026 07:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zephyrproject-rtos
Zephyrproject-rtos zephyr |
|
| Vendors & Products |
Zephyrproject-rtos
Zephyrproject-rtos zephyr |
Sat, 28 Mar 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, corrupting kernel memory (CWE-120). Exploit requires local code that can call the socket send API; no remote attacker can reach it directly. | |
| Title | net: eswifi socket send payload length not bounded | |
| Weaknesses | CWE-120 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: zephyr
Published:
Updated: 2026-04-01T13:52:01.510Z
Reserved: 2026-01-30T05:53:41.457Z
Link: CVE-2026-1679
Updated: 2026-04-01T13:51:56.396Z
Status : Analyzed
Published: 2026-03-28T00:16:04.740
Modified: 2026-03-31T20:35:00.897
Link: CVE-2026-1679
No data.
OpenCVE Enrichment
Updated: 2026-04-02T07:55:11Z