CVE-2026-2662

A weakness has been identified in FascinatedBox lily up to 2.3. This vulnerability affects the function count_transforms of the file src/lily_emitter.c. This manipulation causes out-of-bounds read. The attack can only be executed locally. The exploit has been made available to the public and could be used for attacks. The project was informed of the problem early through an issue report but has not responded yet.
References
Link Resource
https://github.com/FascinatedBox/lily/ Product
https://github.com/FascinatedBox/lily/issues/381 Exploit Issue Tracking Third Party Advisory
https://github.com/oneafter/0122/blob/main/i381/repro.lily Exploit
https://vuldb.com/?ctiid.346460 Permissions Required VDB Entry
https://vuldb.com/?id.346460 Third Party Advisory VDB Entry
https://vuldb.com/?submit.753166 Exploit Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:lily-lang:lily:*:*:*:*:*:*:*:*

History

20 Feb 2026, 20:03

Type Values Removed Values Added
References () https://github.com/FascinatedBox/lily/ - () https://github.com/FascinatedBox/lily/ - Product
References () https://github.com/FascinatedBox/lily/issues/381 - () https://github.com/FascinatedBox/lily/issues/381 - Exploit, Issue Tracking, Third Party Advisory
References () https://github.com/oneafter/0122/blob/main/i381/repro.lily - () https://github.com/oneafter/0122/blob/main/i381/repro.lily - Exploit
References () https://vuldb.com/?ctiid.346460 - () https://vuldb.com/?ctiid.346460 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.346460 - () https://vuldb.com/?id.346460 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.753166 - () https://vuldb.com/?submit.753166 - Exploit, Third Party Advisory, VDB Entry
First Time Lily-lang
Lily-lang lily
CPE cpe:2.3:a:lily-lang:lily:*:*:*:*:*:*:*:*
CWE CWE-787
Summary
  • (es) Se ha identificado una debilidad en FascinatedBox lily hasta la versión 2.3. Esta vulnerabilidad afecta la función count_transforms del archivo src/lily_emitter.c. Esta manipulación causa una lectura fuera de límites. El ataque solo puede ejecutarse localmente. El exploit se ha puesto a disposición del público y podría usarse para ataques. El proyecto fue informado del problema tempranamente a través de un informe de problema, pero aún no ha respondido.

18 Feb 2026, 20:18

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-18 20:18

Updated : 2026-02-20 20:03


NVD link : CVE-2026-2662

Mitre link : CVE-2026-2662

CVE.ORG link : CVE-2026-2662


JSON object : View

Products Affected

lily-lang

  • lily
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-125

Out-of-bounds Read

CWE-787

Out-of-bounds Write