CVE-2026-0930

Potential read out of bounds case with wolfSSHd on Windows while handling a terminal resize request. An authenticated user could trigger the out of bounds read after establishing a connection which would leak the adjacent stack memory to the pseudo-console output.
References
Link Resource
https://github.com/wolfssl/wolfssh/pull/846 Issue Tracking
Configurations

Configuration 1 (hide)

cpe:2.3:a:wolfssh:wolfssh:*:*:*:*:*:*:*:*

History

24 Apr 2026, 19:15

Type Values Removed Values Added
References () https://github.com/wolfssl/wolfssh/pull/846 - () https://github.com/wolfssl/wolfssh/pull/846 - Issue Tracking
CPE cpe:2.3:a:wolfssh:wolfssh:*:*:*:*:*:*:*:*
CWE CWE-125
First Time Wolfssh
Wolfssh wolfssh
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 4.3

20 Apr 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-04-20 22:16

Updated : 2026-04-24 19:15


NVD link : CVE-2026-0930

Mitre link : CVE-2026-0930

CVE.ORG link : CVE-2026-0930


JSON object : View

Products Affected

wolfssh

  • wolfssh
CWE
CWE-126

Buffer Over-read

CWE-125

Out-of-bounds Read