LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-23750

CVE-2026-23750 - Vulnerability Analysis

HighCVSS: 8.1

Last Updated: February 27, 2026

Golioth Pouch - Buffer Overflow

Published: February 26, 2026Updated: February 27, 2026

Overview

Golioth Pouch < [INSERT FIXED VERSION] contains a heap-based buffer overflow caused by improper fragment size verification in BLE GATT server certificate handling, letting adjacent BLE clients cause memory corruption and crash, exploit requires BLE client proximity.

Severity & Score

Severity: High
CVSS Score: 8.1
EPSS Score: 1.2%(Probability of exploitation in next 30 days)

Impact

Adjacent BLE clients can cause heap overflow leading to crash and potential memory corruption, impacting system integrity.

Mitigation

Update to the fixed version as per commit 1b2219a1 or latest available version.

Social Media Activity(1 post)

TheHackerWire
TheHackerWire
@thehackerwire
Feb 28, 2026

🟠 CVE-2026-23750 - High (8.1) Golioth Pouch version 0.1.0, prior to commit 1b2219a1, contains a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fra... šŸ”— https://www.thehackerwire.com/vulnerability/CVE-2026-23750/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack

View original post

Details

CVE ID
CVE-2026-23750
Severity
High
CVSS Score
8.1
Type
buffer_overflow
Status
unconfirmed
EPSS
1.2%
Social Posts
1

CWE

  • CWE-122

CVSS Metrics

CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

EPSS Score

1.2%Probability of exploitation in the next 30 days