No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 23 Feb 2026 03:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This affects the function getpeer of the file /src/net_builtin.c of the component TCP Sequence Number Handler. The manipulation leads to improper verification of source of a communication channel. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way. | |
| Title | Cesanta Mongoose TCP Sequence Number net_builtin.c getpeer verification of source | |
| First Time appeared |
Cesanta
Cesanta mongoose |
|
| Weaknesses | CWE-940 | |
| CPEs | cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cesanta
Cesanta mongoose |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-02-23T02:32:07.568Z
Reserved: 2026-02-22T07:57:28.584Z
Link: CVE-2026-2967
No data.
Status : Received
Published: 2026-02-23T04:16:02.040
Modified: 2026-02-23T04:16:02.040
Link: CVE-2026-2967
No data.
OpenCVE Enrichment
No data.