Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Thu, 07 May 2026 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Mon, 04 May 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Openvehicles
Openvehicles open Vehicle Monitoring System 3 |
|
| Vendors & Products |
Openvehicles
Openvehicles open Vehicle Monitoring System 3 |
Sat, 02 May 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Buffer Overflow in OVMS3 CANswitch DLC Parsing Allows Remote Denial or Code Execution |
Fri, 01 May 2026 18:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-121 | |
| Metrics |
cvssV3_1
|
Fri, 01 May 2026 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_canswitch.cpp the parser does not properly validate a CANswitch DLC value, allowing remote attackers to cause a denial of service or possibly execute arbitrary code via crafted CANswitch frames. | |
| References |
|
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-05-07T18:42:33.535Z
Reserved: 2026-04-27T00:00:00.000Z
Link: CVE-2026-42469
Updated: 2026-05-01T17:40:12.624Z
Status : Awaiting Analysis
Published: 2026-05-01T17:16:25.260
Modified: 2026-05-07T19:16:02.073
Link: CVE-2026-42469
No data.
OpenCVE Enrichment
Updated: 2026-05-04T19:44:52Z