Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 17:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Thu, 30 Apr 2026 23:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Code-projects
Code-projects for Plugin |
|
| Vendors & Products |
Code-projects
Code-projects for Plugin |
Thu, 30 Apr 2026 22:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A vulnerability was detected in code-projects for Plugin 4.1.2cu.5137. The impacted element is the function setWiFiMultipleConfig in the library /lib/cste_modules/wireless.so of the file /cgi-bin/cstecgi.cgi. The manipulation of the argument wepkey2 results in buffer overflow. The attack can be launched remotely. The exploit is now public and may be used. | |
| Title | code-projects for Plugin cstecgi.cgi setWiFiMultipleConfig buffer overflow | |
| Weaknesses | CWE-119 CWE-120 |
|
| References |
| |
| Metrics |
cvssV2_0
|
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-05-04T16:56:29.317Z
Reserved: 2026-04-30T14:45:25.250Z
Link: CVE-2026-7503
Updated: 2026-05-04T16:56:21.203Z
Status : Deferred
Published: 2026-04-30T22:16:26.920
Modified: 2026-05-01T15:26:24.553
Link: CVE-2026-7503
No data.
OpenCVE Enrichment
Updated: 2026-05-02T00:15:06Z