Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 28 Apr 2026 09:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Sbabic
Sbabic swupdate |
|
| Vendors & Products |
Sbabic
Sbabic swupdate |
Sat, 25 Apr 2026 02:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 23 Apr 2026 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | SWUpdate contains an integer underflow vulnerability in the multipart upload parser in mongoose_multipart.c that allows unauthenticated attackers to cause a denial of service by sending a crafted HTTP POST request to /upload with a malformed multipart boundary and controlled TCP stream timing. Attackers can trigger an integer underflow in the mg_http_multipart_continue_wait_for_chunk() function when the buffer length falls within a specific range, causing an out-of-bounds heap read that writes data beyond the allocated receive buffer to a local IPC socket. | |
| Title | SWUpdate Integer Underflow in Multipart Upload Parser | |
| Weaknesses | CWE-125 CWE-191 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-11T23:11:33.589Z
Reserved: 2026-02-27T21:07:55.468Z
Link: CVE-2026-28525
Updated: 2026-04-25T01:32:18.736Z
Status : Awaiting Analysis
Published: 2026-04-23T21:16:05.367
Modified: 2026-04-24T14:50:56.203
Link: CVE-2026-28525
No data.
OpenCVE Enrichment
Updated: 2026-04-28T09:25:43Z