Description
A flaw has been found in cijliu librtsp up to 2ec1a81ad65280568a0c7c16420d7c10fde13b04. This affects the function rtsp_parse_method. This manipulation causes buffer overflow. It is possible to launch the attack on the local host. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-01-18
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Buffer Overflow
Action: Assess Impact
AI Analysis

Impact

The flaw resides in the rtsp_parse_method routine of Cijliu's librtsp library. An attacker can supply crafted data that triggers a buffer overflow during method parsing (CWE-119 and CWE-120). The resulting memory corruption may allow the attacker to alter execution flow, potentially enabling arbitrary code execution on the system that hosts the library. The vulnerability is purely local, so it requires the attacker to have local or privileged access to the machine running the vulnerable code.

Affected Systems

This issue affects the Cijliu librtsp library (all versions up to the 2ec1a81ad65280568a0c7c16420d7c10fde13b04 commit). No specific version ranges are identified beyond this release. The product is updated via continuous delivery with rolling releases, so new builds may contain the fix, but the vendor has not published a versioned fix or release notes.

Risk and Exploitability

The CVSS score of 4.8 reflects moderate impact and local scope. The EPSS score of less than 1% indicates a very low probability of exploitation at present, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Given that the attack vector is local, the practical risk depends on the security posture of the host; those with unrestricted local access or administrative rights are at higher risk. Until a vendor-provided patch or comprehensive workaround is released, the vulnerability remains a moderate concern for systems running the affected library.

Generated by OpenCVE AI on April 18, 2026 at 19:06 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest available build of Cijliu librtsp once a fix has been released by the vendor.
  • If the library is required but no newer release exists, consider disabling the rtsp_parse_method capability or substituting with a secure alternative.
  • Continuously monitor vendor advisories for updates and apply patches as soon as they are available.

Generated by OpenCVE AI on April 18, 2026 at 19:06 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Wed, 18 Feb 2026 14:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:cijliu:librtsp:*:*:*:*:*:*:*:*

Wed, 21 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 19 Jan 2026 09:45:00 +0000

Type Values Removed Values Added
First Time appeared Cijliu
Cijliu librtsp
Vendors & Products Cijliu
Cijliu librtsp

Sun, 18 Jan 2026 04:45:00 +0000

Type Values Removed Values Added
Description A flaw has been found in cijliu librtsp up to 2ec1a81ad65280568a0c7c16420d7c10fde13b04. This affects the function rtsp_parse_method. This manipulation causes buffer overflow. It is possible to launch the attack on the local host. Continious delivery with rolling releases is used by this product. Therefore, no version details of affected nor updated releases are available. The vendor was contacted early about this disclosure but did not respond in any way.
Title cijliu librtsp rtsp_parse_method buffer overflow
Weaknesses CWE-119
CWE-120
References
Metrics cvssV2_0

{'score': 4.3, 'vector': 'AV:L/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 5.3, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-02-23T08:36:03.480Z

Reserved: 2026-01-17T08:49:21.646Z

Link: CVE-2026-1110

cve-icon Vulnrichment

Updated: 2026-01-21T18:51:13.851Z

cve-icon NVD

Status : Analyzed

Published: 2026-01-18T05:16:19.280

Modified: 2026-02-18T14:38:09.837

Link: CVE-2026-1110

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T19:15:10Z

Weaknesses