CVE-2026-2966

A weakness has been identified in Cesanta Mongoose up to 7.20. The impacted element is the function mg_sendnsreq of the file /src/dns.c of the component DNS Transaction ID Handler. Executing a manipulation of the argument random can lead to insufficiently random values. The attack can be launched remotely. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/dwBruijn/CVEs/blob/main/Mongoose/mg_sendnsreq.md Exploit Third Party Advisory
https://github.com/dwBruijn/CVEs/blob/main/Mongoose/mg_sendnsreq.md#poc Exploit Third Party Advisory
https://vuldb.com/?ctiid.347333 Permissions Required VDB Entry
https://vuldb.com/?id.347333 Third Party Advisory VDB Entry
https://vuldb.com/?submit.755304 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*

History

23 Feb 2026, 20:18

Type Values Removed Values Added
CPE cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*
First Time Cesanta mongoose
Cesanta
References () https://github.com/dwBruijn/CVEs/blob/main/Mongoose/mg_sendnsreq.md - () https://github.com/dwBruijn/CVEs/blob/main/Mongoose/mg_sendnsreq.md - Exploit, Third Party Advisory
References () https://github.com/dwBruijn/CVEs/blob/main/Mongoose/mg_sendnsreq.md#poc - () https://github.com/dwBruijn/CVEs/blob/main/Mongoose/mg_sendnsreq.md#poc - Exploit, Third Party Advisory
References () https://vuldb.com/?ctiid.347333 - () https://vuldb.com/?ctiid.347333 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.347333 - () https://vuldb.com/?id.347333 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.755304 - () https://vuldb.com/?submit.755304 - Third Party Advisory, VDB Entry

23 Feb 2026, 18:13

Type Values Removed Values Added
Summary
  • (es) Se ha identificado una debilidad en Cesanta Mongoose hasta la versión 7.20. El elemento afectado es la función mg_sendnsreq del archivo /src/dns.c del componente Gestor de ID de Transacción DNS. Ejecutar el argumento random manipulado puede conducir a valores insuficientemente aleatorios. El ataque puede lanzarse de forma remota. El ataque tiene un nivel de complejidad alto y se considera difícil de explotar. El exploit se ha puesto a disposición del público y podría usarse para ataques. Se contactó al proveedor con antelación sobre esta divulgación, pero no respondió de ninguna manera.

23 Feb 2026, 03:15

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-23 03:15

Updated : 2026-02-23 20:18


NVD link : CVE-2026-2966

Mitre link : CVE-2026-2966

CVE.ORG link : CVE-2026-2966


JSON object : View

Products Affected

cesanta

  • mongoose
CWE
CWE-310

Cryptographic Issues

CWE-330

Use of Insufficiently Random Values