{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/cve-2026-1679/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["high"],"_cs_tags":["cve-2026-1679","buffer-overflow","kernel-memory-corruption"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCVE-2026-1679 is a buffer overflow vulnerability affecting the eswifi socket offload driver. The vulnerability arises because the driver copies user-provided payloads into a fixed-size buffer without validating the input size. This can lead to an overflow of the \u003ccode\u003eeswifi-\u0026gt;buf\u003c/code\u003e buffer, resulting in corruption of kernel memory (CWE-120). The Zephyr Project assigned a CVSS v3.1 score of 7.3 to this vulnerability. Exploitation requires local code execution to call the socket send API; it is not…\u003c/p\u003e\n","date_modified":"2026-03-28T00:16:04Z","date_published":"2026-03-28T00:16:04Z","id":"/briefs/2026-03-eswifi-buffer-overflow/","summary":"CVE-2026-1679 describes a vulnerability in the eswifi socket offload driver where user-provided payloads are copied into a fixed buffer without proper size checking, leading to a buffer overflow and kernel memory corruption.","title":"eswifi Socket Offload Driver Buffer Overflow Vulnerability (CVE-2026-1679)","url":"https://feed.craftedsignal.io/briefs/2026-03-eswifi-buffer-overflow/"}],"language":"en","title":"CraftedSignal Threat Feed — Cve-2026-1679","version":"https://jsonfeed.org/version/1.1"}