Back to VulnFeed / CVE-2026-33846
root@hackertop:~/vulnfeed/CVE-2026-33846#
CVE-2026-33846 MEDIUM CVE ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

GnuTLS DTLS Handshake Fragment Reassembly merge_handshake_packet message_length length parameter

GnuTLS 17d ago Impact pending confirmation
LIFECYCLE
6.4 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in GnuTLS (Network Encryption Software) (the affected version is unknown). It has been declared as problematic. This vulnerability affects the function merge_handshake_packet of the component DTLS Handshake Fragment Reassembly Handler. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
The manipulation of the argument message_length with an unknown input leads to a unknown weakness. The CWE definition for the vulnerability is CWE-130. The product parses a formatted message or structure, but it does not handle or incorrectly handles a length field that is inconsistent with the actual length of the associated data.

Impact: As an impact it is known to affect availability.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-33846 · CVSS 6.4 · Active Threat