Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 13 Apr 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 13 Apr 2026 14:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Bluetooth ACPI Driver Buffer Overflow Allows Code Execution Through Modified Registry Values |
Mon, 13 Apr 2026 13:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dynabook
Dynabook drfec.sys Dynabook tosrfec.sys |
|
| Vendors & Products |
Dynabook
Dynabook drfec.sys Dynabook tosrfec.sys |
Mon, 13 Apr 2026 05:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Bluetooth ACPI Drivers provided by Dynabook Inc. contain a stack-based buffer overflow vulnerability. An attacker may execute arbitrary code by modifying certain registry values. | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: jpcert
Published:
Updated: 2026-04-13T15:00:22.042Z
Reserved: 2026-04-03T08:21:59.910Z
Link: CVE-2026-35553
Updated: 2026-04-13T15:00:18.138Z
Status : Awaiting Analysis
Published: 2026-04-13T05:16:04.693
Modified: 2026-04-13T15:01:43.663
Link: CVE-2026-35553
No data.
OpenCVE Enrichment
Updated: 2026-04-13T12:53:20Z