Description
A vulnerability was determined in Planet ICG-2510 1.0_20250811. The impacted element is the function sub_40C8E4 of the file /usr/sbin/httpd of the component Language Package Configuration Handler. Executing a manipulation of the argument Language can lead to stack-based buffer overflow. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Published: 2026-03-08
Score: 5.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stack-based buffer overflow enabling remote code execution
Action: Assess Impact
AI Analysis

Impact

A locally unknown function, sub_40C8E4, in the Planet ICG-2510 Language Package Configuration Handler, is susceptible to a stack-based buffer overflow when an attacker manipulates the argument Language. The overflow can overwrite memory on the server stack and potentially allow arbitrary code execution. The CVE description confirms that the attack can be launched remotely and that the vendor has not provided a fix. The vulnerability is classified under CWEs 119 and 121, indicating improper bounds checking and potential stack corruption.

Affected Systems

The affected product is Planet ICG-2510, version 1.0_20250811. Users running this firmware on their HTTPd service are at risk if the Language Package Configuration Handler is enabled. No additional versions or environments are known to be affected at this time.

Risk and Exploitability

The CVSS base score for this issue is 5.3, reflecting moderate severity. EPSS indicates a very low exploitation probability (<1%) and the vulnerability is not listed in the CISA KEV catalog. Nevertheless, the remote nature of the trigger and the possibility of arbitrary code execution give the attacker significant impact potential. Exploitation requires sending a crafted request containing an overly large Language argument to the httpd service. It does not rely on any additional preconditions beyond network reachability to the vulnerable handler.

Generated by OpenCVE AI on April 17, 2026 at 12:05 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • If you are running Planet ICG-2510 1.0_20250811, contact the vendor for an update or fix; if no patch is available, plan to replace the firmware.
  • Limit network exposure by restricting remote access to the httpd service, allowing only trusted IP addresses or internal networks to interact with the Language Package Configuration Handler.
  • If the Language Package Configuration Handler is not needed in your deployment, disable or remove that module from the HTTPd configuration.

Generated by OpenCVE AI on April 17, 2026 at 12:05 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Mar 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 09 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Planet
Planet icg-2510
Vendors & Products Planet
Planet icg-2510

Sun, 08 Mar 2026 02:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was determined in Planet ICG-2510 1.0_20250811. The impacted element is the function sub_40C8E4 of the file /usr/sbin/httpd of the component Language Package Configuration Handler. Executing a manipulation of the argument Language can lead to stack-based buffer overflow. The attack can be launched remotely. The vendor was contacted early about this disclosure but did not respond in any way.
Title Planet ICG-2510 Language Package Configuration httpd sub_40C8E4 stack-based overflow
Weaknesses CWE-119
CWE-121
References
Metrics cvssV2_0

{'score': 6.5, 'vector': 'AV:N/AC:L/Au:S/C:P/I:P/A:P/E:POC/RL:ND/RC:UR'}

cvssV3_0

{'score': 6.3, 'vector': 'CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:X/RC:R'}

cvssV4_0

{'score': 5.3, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-03-10T13:45:34.980Z

Reserved: 2026-03-07T08:42:47.052Z

Link: CVE-2026-3697

cve-icon Vulnrichment

Updated: 2026-03-10T13:45:29.123Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-03-08T02:16:00.760

Modified: 2026-03-09T13:35:07.393

Link: CVE-2026-3697

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T12:15:18Z

Weaknesses