CVE-2026-29972 - Vulnerability Analysis
HighCVSS: 8.2Last Updated: May 8, 2026
nanoMODBUS - Buffer Overflow
Published: May 8, 2026Updated: May 8, 2026Remote Exploitable
Overview
nanoMODBUS through v1.22.0 contains a stack-based buffer overflow caused by improper validation of byte_count in recv_read_registers_res(), letting a malicious Modbus TCP server cause buffer overflow and potentially remote code execution, exploit requires a malicious server response.
Severity & Score
Severity: High
CVSS Score: 8.2
Impact
A malicious Modbus TCP server can cause buffer overflow leading to potential remote code execution on the client system.
Mitigation
Update nanoMODBUS to a version later than v1.22.0 or the latest available version.
References
Related Resources
Details
- CVE ID
- CVE-2026-29972
- Severity
- High
- CVSS Score
- 8.2
- Type
- buffer_overflow
- Status
- new
CWE
- CWE-121
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H