<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>CVE-2026-8836 — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/cve-2026-8836/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 18 May 2026 19:17:57 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/cve-2026-8836/feed.xml" rel="self" type="application/rss+xml"/><item><title>lwIP SNMPv3 USM Handler Stack-Based Buffer Overflow (CVE-2026-8836)</title><link>https://feed.craftedsignal.io/briefs/2026-05-lwip-snmp-overflow/</link><pubDate>Mon, 18 May 2026 19:17:57 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-lwip-snmp-overflow/</guid><description>A stack-based buffer overflow vulnerability (CVE-2026-8836) exists in lwIP up to version 2.2.1 within the snmpv3 USM Handler, allowing remote attackers to execute arbitrary code by manipulating the `msgAuthenticationParameters` argument in the `snmp_parse_inbound_frame` function.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, identified as CVE-2026-8836, has been discovered in lwIP versions up to 2.2.1. The vulnerability resides within the <code>snmpv3 USM Handler</code> component, specifically in the <code>snmp_parse_inbound_frame</code> function of the <code>src/apps/snmp/snmp_msg.c</code> file. By manipulating the <code>msgAuthenticationParameters</code> argument, a remote attacker can trigger a buffer overflow, potentially leading to arbitrary code execution. The patch addressing this vulnerability is identified by the commit hash <code>0c957ec03054eb6c8205e9c9d1d05d90ada3898c</code>. This vulnerability poses a significant risk as it can be exploited remotely without authentication.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker identifies a vulnerable lwIP instance with SNMPv3 USM enabled.</li>
<li>The attacker crafts a malicious SNMPv3 packet targeting the <code>snmp_parse_inbound_frame</code> function.</li>
<li>The crafted packet includes a <code>msgAuthenticationParameters</code> argument designed to exceed the buffer&rsquo;s capacity.</li>
<li>The <code>snmp_parse_inbound_frame</code> function processes the malformed SNMPv3 packet without proper bounds checking.</li>
<li>The oversized <code>msgAuthenticationParameters</code> argument overwrites adjacent memory on the stack, including return addresses.</li>
<li>Upon function return, the overwritten return address is used, redirecting execution flow to attacker-controlled code.</li>
<li>The attacker gains arbitrary code execution within the context of the lwIP process.</li>
<li>The attacker can then use this code execution to further compromise the system, potentially leading to data exfiltration or denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-8836 allows a remote attacker to execute arbitrary code on the vulnerable system. Given the widespread use of lwIP in embedded devices and network appliances, a large number of devices are potentially affected. A successful attack could lead to complete system compromise, allowing the attacker to steal sensitive data, disrupt network services, or use the compromised device as a bot in a larger botnet. The CVSS v3.1 score of 9.8 highlights the critical severity of this vulnerability.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch identified by commit hash <code>0c957ec03054eb6c8205e9c9d1d05d90ada3898c</code> to address the buffer overflow.</li>
<li>Monitor network traffic for malformed SNMPv3 packets, especially those with unusually large <code>msgAuthenticationParameters</code> using the provided Sigma rules.</li>
<li>Consider disabling SNMPv3 USM if it is not required to reduce attack surface.</li>
<li>Deploy the Sigma rule &ldquo;Detect CVE-2026-8836 Exploitation Attempt via Malformed SNMP Packet&rdquo; to detect potential exploitation attempts.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>snmp</category><category>buffer_overflow</category><category>rce</category><category>CVE-2026-8836</category></item></channel></rss>