Description
A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
Published: 2026-05-11
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An integer coercion error in the ippReadChunkedBody function of bettercap’s zerogod IPP Service can cause unsafe integer conversions that may lead to application failure or service disruption. The vulnerability can be accessed remotely and requires complex input manipulation. Exploitation remains difficult.

Affected Systems

All installations of bettercap up to and including version 2.41.5 are affected. The flaw resides in the zerogod IPP Service module and applies to any deployed instance that processes IPP requests.

Risk and Exploitability

With a CVSS score of 6.3 the flaw presents a moderate risk; the EPSS score is not available and the vulnerability is not listed in the CISA KEV catalog. Attackers must remotely deliver a specially crafted IPP request containing malformed data that triggers the integer coercion error. The high complexity and difficult exploitation reduce the likelihood of widespread attacks at this time.

Generated by OpenCVE AI on May 11, 2026 at 07:50 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade bettercap to the patch release defined by commit 3731d5576cffae9eefe3721cd46a40933304129f or newer.
  • If an upgrade is not feasible, disable the zerogod IPP Service feature or block traffic to the IPP service port to prevent vulnerable requests.
  • Implement monitoring on IPP traffic to detect abnormal or malformed requests and verify that input validation occurs before processing data.

Generated by OpenCVE AI on May 11, 2026 at 07:50 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Mon, 11 May 2026 18:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 11 May 2026 17:00:00 +0000

Type Values Removed Values Added
First Time appeared Bettercap
Bettercap bettercap
Vendors & Products Bettercap
Bettercap bettercap

Mon, 11 May 2026 06:15:00 +0000

Type Values Removed Values Added
Description A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
Title bettercap zerogod IPP Service zerogod_ipp_primitives.go ippReadChunkedBody integer coercion
Weaknesses CWE-189
CWE-192
References
Metrics cvssV2_0

{'score': 2.6, 'vector': 'AV:N/AC:H/Au:N/C:N/I:N/A:P/E:POC/RL:OF/RC:C'}

cvssV3_0

{'score': 3.7, 'vector': 'CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV3_1

{'score': 3.7, 'vector': 'CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:L/E:P/RL:O/RC:C'}

cvssV4_0

{'score': 6.3, 'vector': 'CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P'}


Subscriptions

Bettercap Bettercap
cve-icon MITRE

Status: PUBLISHED

Assigner: VulDB

Published:

Updated: 2026-05-11T17:31:02.040Z

Reserved: 2026-05-10T16:05:45.629Z

Link: CVE-2026-8275

cve-icon Vulnrichment

Updated: 2026-05-11T15:54:56.769Z

cve-icon NVD

Status : Received

Published: 2026-05-11T06:16:09.840

Modified: 2026-05-11T06:16:09.840

Link: CVE-2026-8275

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-05-11T16:10:51Z

Weaknesses