Description
JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp.
Published: 2026-05-01
Score: 10 Critical
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Js8call
Js8call js8call
Js8call js8call-improved
Vendors & Products Js8call
Js8call js8call
Js8call js8call-improved

Sat, 02 May 2026 00:00:00 +0000

Type Values Removed Values Added
Title Stack-Based Buffer Overflow in JS8Call via APRSIS Transmission

Fri, 01 May 2026 22:45:00 +0000


Fri, 01 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 01 May 2026 07:45:00 +0000

Type Values Removed Values Added
Description JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp. JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp.

Fri, 01 May 2026 07:00:00 +0000

Type Values Removed Values Added
Description JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp.
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:U/V:D/RE:M/U:Green'}


Subscriptions

Js8call Js8call Js8call-improved
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-01T22:10:45.285Z

Reserved: 2026-05-01T06:42:18.918Z

Link: CVE-2026-42996

cve-icon Vulnrichment

Updated: 2026-05-01T13:24:29.761Z

cve-icon NVD

Status : Deferred

Published: 2026-05-01T07:15:59.787

Modified: 2026-05-01T23:16:18.233

Link: CVE-2026-42996

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-04T16:07:39Z

Weaknesses