Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Automotivelinux
Automotivelinux agl-service-can-low-level |
|
| Vendors & Products |
Automotivelinux
Automotivelinux agl-service-can-low-level |
Sat, 02 May 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Stack Buffer Overflow in agl-service-can-low-level Enables Remote Code Execution via CAN Bus on 32-bit ARM ECUs |
Fri, 01 May 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Fri, 01 May 2026 16:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | AGL agl-service-can-low-level thru 17.1.12 contains a stack buffer overflow in the uds-c library. The send_diagnostic_request function in uds.c allocates a 6-byte stack buffer (MAX_DIAGNOSTIC_PAYLOAD_SIZE=6) but copies up to 7 bytes (MAX_UDS_REQUEST_PAYLOAD_LENGTH=7) via memcpy at an offset of 1+pid_length (2-3 bytes), resulting in 1-4 bytes of controlled stack overflow. The payload_length field (uint8_t) has no bounds check against the destination buffer. On 32-bit ARM automotive ECUs without stack canaries, this can lead to return address overwrite and RCE. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-01T18:39:04.629Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-37530
Updated: 2026-05-01T18:39:00.488Z
Status : Awaiting Analysis
Published: 2026-05-01T17:16:22.603
Modified: 2026-05-07T15:15:06.770
Link: CVE-2026-37530
No data.
OpenCVE Enrichment
Updated: 2026-05-04T19:44:48Z