A weakness has been identified in Cesanta Mongoose up to 7.20. This vulnerability affects the function handle_opt of the file /src/net_builtin.c of the component TCP Option Handler. This manipulation of the argument optlen causes infinite loop. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 7.21 is able to resolve this issue. Upgrading the affected component is advised. VulDB has contacted the vendor early and they confirmed quickly, that this issue got fixed already.
References
| Link | Resource |
|---|---|
| https://github.com/cesanta/mongoose/releases/tag/7.21 | Product Release Notes |
| https://github.com/dwBruijn/CVEs/blob/main/Mongoose/TCP_opt_dos.md | Exploit Third Party Advisory |
| https://vuldb.com/submit/796230 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/359528 | Third Party Advisory VDB Entry |
| https://vuldb.com/vuln/359528/cti | Permissions Required VDB Entry |
Configurations
History
29 Apr 2026, 19:05
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Cesanta mongoose
Cesanta |
|
| References | () https://github.com/cesanta/mongoose/releases/tag/7.21 - Product, Release Notes | |
| References | () https://github.com/dwBruijn/CVEs/blob/main/Mongoose/TCP_opt_dos.md - Exploit, Third Party Advisory | |
| References | () https://vuldb.com/submit/796230 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/359528 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/vuln/359528/cti - Permissions Required, VDB Entry | |
| CPE | cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:* |
25 Apr 2026, 17:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-04-25 17:16
Updated : 2026-04-29 19:05
NVD link : CVE-2026-6985
Mitre link : CVE-2026-6985
CVE.ORG link : CVE-2026-6985
JSON object : View
Products Affected
cesanta
- mongoose
