Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 13 May 2026 11:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Debevv
Debevv nanomodbus |
|
| Vendors & Products |
Debevv
Debevv nanomodbus |
Fri, 08 May 2026 20:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stack-Based Buffer Overflow in nanoMODBUS Library Allows Remote Code Execution |
Fri, 08 May 2026 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Fri, 08 May 2026 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | nanoMODBUS through v1.22.0 has a stack-based buffer overflow in recv_read_registers_res() in nanomodbus.c. When a client calls nmbs_read_holding_registers() or nmbs_read_input_registers(), the library writes register data from the server response to the caller-provided buffer based on the response's byte_count field before validating that byte_count matches the requested quantity. A malicious Modbus TCP server can send a response with byte_count=250 (125 registers) regardless of the requested quantity, causing up to 248 bytes of attacker-controlled data to overflow the buffer, potentially allowing remote code execution. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-08T15:59:03.619Z
Reserved: 2026-03-04T00:00:00.000Z
Link: CVE-2026-29972
Updated: 2026-05-08T15:58:57.641Z
Status : Deferred
Published: 2026-05-08T16:16:09.960
Modified: 2026-05-13T15:46:19.993
Link: CVE-2026-29972
No data.
OpenCVE Enrichment
Updated: 2026-05-13T10:51:43Z