CVE-2026-23750 - Vulnerability Analysis
HighCVSS: 8.1Last Updated: February 27, 2026
Golioth Pouch - Buffer Overflow
Overview
Golioth Pouch < [INSERT FIXED VERSION] contains a heap-based buffer overflow caused by improper fragment size verification in BLE GATT server certificate handling, letting adjacent BLE clients cause memory corruption and crash, exploit requires BLE client proximity.
Severity & Score
Impact
Adjacent BLE clients can cause heap overflow leading to crash and potential memory corruption, impacting system integrity.
Mitigation
Update to the fixed version as per commit 1b2219a1 or latest available version.
References
- https://github.com/golioth/golioth-firmware-sdk/releases/tag/v0.22.0
- https://github.com/golioth/pouch/commit/1b2219a1
- https://www.vulncheck.com/advisories/golioth-pouch-ble-gatt-heap-based-buffer-overflow
- https://secmate.dev/disclosures/SECMATE-2025-0018
- https://blog.secmate.dev/posts/golioth-vulnerabilities-disclosure/
Social Media Activity(1 post)
š CVE-2026-23750 - High (8.1) Golioth Pouch version 0.1.0, prior to commit 1b2219a1, contains a heap-based buffer overflow in BLE GATT server certificate handling. server_cert_write() allocates a heap buffer of size CONFIG_POUCH_SERVER_CERT_MAX_LEN when receiving the first fra... š https://www.thehackerwire.com/vulnerability/CVE-2026-23750/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postRelated Resources
Details
- CVE ID
- CVE-2026-23750
- Severity
- High
- CVSS Score
- 8.1
- Type
- buffer_overflow
- Status
- unconfirmed
- EPSS
- 1.2%
- Social Posts
- 1
CWE
- CWE-122
CVSS Metrics
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H