Back to VulnFeed / CVE-2026-7503
root@hackertop:~/vulnfeed/CVE-2026-7503#
CVE-2026-7503 HIGH Memory Corruption ⚠ Unpatched · Zero-day◉ PoC 公开 Lifecycle 4/7

code-projects for Plugin 4.1.2cu.5137 /cgi-bin/cstecgi.cgi setWiFiMultipleConfig wepkey2 buffer overflow

for Plugin 1d ago Impact pending confirmation
LIFECYCLE
8.0 CVSS
Vulnerability Detail Mitigation Lifecycle CVSS Assessment
Vulnerability Description
A vulnerability was found in code-projects for Plugin 4.1.2cu.5137 (Project Management Software). It has been declared as critical. Affected by this vulnerability is the function setWiFiMultipleConfig in the library /lib/cste_modules/wireless.so of the file /cgi-bin/cstecgi.cgi. There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Root Cause Analysis
The manipulation of the argument wepkey2 with an unknown input leads to a unknown weakness. The CWE definition for the vulnerability is CWE-120. The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer, leading to a buffer overflow.

Impact: As an impact it is known to affect confidentiality, integrity, and availability.

Exploit: It is possible to download the exploit at github.com. It is declared as proof-of-concept.

Countermeasure: There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
Validation (PoC/EXP) - Looking for Contributors
No public PoC yet

Public validation traces already exist. Community contributors can extend them with richer reproduction content.

Contribute Your PoC/EXP
Log in to contribute PoC/EXP content. Log in
Back to VulnFeed
CVE-2026-7503 · CVSS 8.0 · Active Threat