CVE-2026-41682
MEDIUMpupnp: Port truncation via atoi() cast in parse_uri() allows SSRF port confusion
Title source: cnaDescription
pupnp is an SDK for development of UPnP device and control point applications. Prior to version 1.18.5, pupnp is vulnerable to SRRF port confusion due to port truncation via atoi() cast in parse_uri(). This issue has been patched in version 1.18.5.
References (3)
Core 3
Core References
X_Refsource_Confirm x_refsource_confirm
https://github.com/pupnp/pupnp/security/advisories/GHSA-q522-6w45-4j58
X_Refsource_Misc x_refsource_misc
https://github.com/pupnp/pupnp/commit/def5f9a2bc42f5b3d713e37c516fbe840ce54b7b
X_Refsource_Misc x_refsource_misc
https://github.com/pupnp/pupnp/releases/tag/release-1.18.5
Scores
CVSS v4
6.9
EPSS
0.0004
EPSS Percentile
11.6%
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
yes
Technical Impact
partial
Details
CWE
CWE-195
CWE-918
Status
published
Products (1)
pupnp/pupnp
< 1.18.5
Published
May 08, 2026
Tracked Since
May 09, 2026