Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 11 May 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Sun, 10 May 2026 21:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Pupnp
Pupnp pupnp |
|
| Vendors & Products |
Pupnp
Pupnp pupnp |
Fri, 08 May 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | pupnp is an SDK for development of UPnP device and control point applications. Prior to version 1.18.5, pupnp is vulnerable to SRRF port confusion due to port truncation via atoi() cast in parse_uri(). This issue has been patched in version 1.18.5. | |
| Title | pupnp: Port truncation via atoi() cast in parse_uri() allows SSRF port confusion | |
| Weaknesses | CWE-195 CWE-918 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-05-11T15:56:09.950Z
Reserved: 2026-04-22T03:53:24.406Z
Link: CVE-2026-41682
Updated: 2026-05-11T15:56:06.680Z
Status : Deferred
Published: 2026-05-08T23:16:35.737
Modified: 2026-05-13T16:01:30.177
Link: CVE-2026-41682
No data.
OpenCVE Enrichment
Updated: 2026-05-10T21:24:42Z