Description
Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_pcap.cpp , the parser's phdr.len field is not properly validated, allowing remote attackers to cause a denial of service or possibly execute arbitrary code via crafted PCAP input.
Published: 2026-05-01
Score: 8.8 High
EPSS: n/a
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

The vulnerability is a stack-based buffer overflow caused by the absence of validation on the phdr.len field in the Open Vehicle Monitoring System 3 (OVMS3) PCAP parser. When an attacker sends a malicious Pcap file containing an oversized length, the parser writes beyond the bounds of the destination buffer, potentially crashing the service or allowing arbitrary code execution. This flaw therefore threatens the availability and integrity of the OVMS3 process, and if exploited, could give remote control over the vehicle monitoring system.

Affected Systems

This defect is present in Open Vehicle Monitoring System 3 release 3.3.005, the only version explicitly identified as affected. Deployments of this release, regardless of vendor distribution, are impacted. Earlier or later versions are not reported to contain the same unvalidated length check.

Risk and Exploitability

The EPSS score is not available and the flaw is not listed in CISA's KEV catalog, so the precise likelihood of exploitation is unknown. Nonetheless, the description indicates the vulnerability can be triggered remotely via a crafted Pcap file, and the potential for remote code execution categorises the risk as high. The CVSS score of 8.8 indicates a critical severity vulnerability. Attackers would simply need to supply a Pcap input that deliberately exceeds the expected header length; no special conditions beyond that are described, making the exploit path realistic for a determined adversary.

Generated by OpenCVE AI on May 2, 2026 at 07:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to the latest OVMS3 release that includes proper bounds checking of the phdr.len field.
  • If an immediate upgrade is not possible, restrict or disable the PCAP ingestion interface for untrusted sources and enforce strict access controls on any network paths that can reach that interface.
  • Run the OVMS3 service with the least privilege necessary, ensuring it does not run as root so that a buffer overflow cannot affect higher‑privileged system components.
  • Monitor service logs and performance for abnormal crashes or memory corruption indicators, and consider implementing a host‑based intrusion detection system to alert on repeated failed Pcap parsing attempts.

Generated by OpenCVE AI on May 2, 2026 at 07:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Sat, 02 May 2026 08:15:00 +0000

Type Values Removed Values Added
Title Buffer Overflow in OVMS3 PCAP Parser Allows Remote Denial of Service and Potential Code Execution

Fri, 01 May 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}

cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 01 May 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-121
Metrics cvssV3_1

{'score': 7.5, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 01 May 2026 17:00:00 +0000

Type Values Removed Values Added
Description Buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) 3.3.005. In canformat_pcap.cpp , the parser's phdr.len field is not properly validated, allowing remote attackers to cause a denial of service or possibly execute arbitrary code via crafted PCAP input.
References

Subscriptions

No data.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-01T18:55:30.328Z

Reserved: 2026-04-27T00:00:00.000Z

Link: CVE-2026-42468

cve-icon Vulnrichment

Updated: 2026-05-01T17:53:41.729Z

cve-icon NVD

Status : Received

Published: 2026-05-01T17:16:25.150

Modified: 2026-05-01T19:16:30.843

Link: CVE-2026-42468

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-02T08:00:14Z

Weaknesses