LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →
Home / Vulnerability Intelligence / CVE-2026-32661

CVE-2026-32661 - Vulnerability Analysis

CriticalCVSS: 9.8

Last Updated: May 13, 2026

GUARDIANWALL MailSuite & Mail Security Cloud - Buffer Overflow

Published: May 13, 2026Updated: May 13, 2026KEVRemote Exploitable

Overview

GUARDIANWALL MailSuite and Mail Security Cloud contain a stack-based buffer overflow caused by improper handling of specially crafted requests in the web service, letting remote attackers execute arbitrary code, exploit requires product configured to run pop3wallpasswd with grdnwww user privilege.

Severity & Score

Severity: Critical
CVSS Score: 9.8
EPSS Score: 13.6%(Probability of exploitation in next 30 days)

Impact

Remote attackers can execute arbitrary code, potentially leading to full system compromise.

Mitigation

Update to the latest version with the buffer overflow fix.

Social Media Activity(1 post)

OffSequence
OffSequence
@offseq
May 13, 2026

🚨 CRITICAL: CVE-2026-32661 stack buffer overflow in Canon GUARDIANWALL MailSuite (v1.4.00 – 2.4.26). Remote code execution possible. Restrict network access & monitor pop3wallpasswd. Patch pending. https://radar.offseq.com/threat/cve-2026-32661-stack-based-buffer-overflow-in-cano-fe8551b1 #OffSeq #CVE202632661 #infosec #vuln

View original post

Details

CVE ID
CVE-2026-32661
Severity
Critical
CVSS Score
9.8
Type
buffer_overflow
Status
rejected
EPSS
13.6%
Social Posts
1

CWE

  • CWE-121

CVSS Metrics

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

EPSS Score

13.6%Probability of exploitation in the next 30 days