Description
Due to a failure in validating the length of a provided MQTT_CMD_PUBLISH parsed message with a variable length header, Cesanta Mongoose, an embeddable web server, version 7.10 is susceptible to a heap-based buffer overflow vulnerability in the default configuration. Version 7.9 and prior does not appear to be vulnerable. This issue is resolved in version 7.11.
References (3)
Core 3
Core References
Exploit, Patch, Third Party Advisory third-party-advisory
technical-description
exploit
https://takeonme.org/cves/CVE-2023-2905.html
Patch patch
https://github.com/cesanta/mongoose/pull/2274
Release Notes release-notes
https://github.com/cesanta/mongoose/releases/tag/7.11
Scores
CVSS v3
8.8
EPSS
0.0022
EPSS Percentile
44.9%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
poc
Automatable
no
Technical Impact
total
Details
CWE
CWE-122
CWE-787
Status
published
Products (1)
cesanta/mongoose
7.10
Published
Aug 09, 2023
Tracked Since
Feb 18, 2026