HomeEmqxCVE-2026-34608

CVE-2026-34608

MEDIUM
4.9CVSS
Published: 2026-04-02
Updated: 2026-04-10
AI Analysis

Description

NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. Prior to version 0.24.10, in NanoMQ's webhook_inproc.c, the hook_work_cb() function processes nng messages by parsing the message body with cJSON_Parse(body). The body is obtained from nng_msg_body(msg), which is a binary buffer without a guaranteed null terminator. This leads to an out-of-bounds read (OOB read) as cJSON_Parse reads until it finds a \0, potentially accessing memory beyond the allocated buffer (e.g., nng_msg metadata or adjacent heap/stack). The issue is often masked by nng's allocation padding (extra 32 bytes of zeros for non-power-of-two sizes <1024 or non-aligned). The overflow is reliably triggered when the JSON payload length is a power-of-two >=1024 (no padding added). This issue has been patched in version 0.24.10.

CVSS Metrics

Vector
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
Attack Vector
network
Complexity
low
Privileges
high
User Action
none
Scope
unchanged
Confidentiality
none
Integrity
none
Availability
high
Weaknesses
CWE-125CWE-457

Metadata

Primary Vendor
EMQX
Published
4/2/2026
Last Modified
4/10/2026
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

emqx : nanomq

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2026-34608 | MEDIUM Severity | CVEDatabase.com | CVEDatabase.com