Vulnerability Description
SWUpdate contains an integer underflow vulnerability in the multipart upload parser in mongoose_multipart.c that allows unauthenticated attackers to cause a denial of service by sending a crafted HTTP POST request to /upload with a malformed multipart boundary and controlled TCP stream timing. Attackers can trigger an integer underflow in the mg_http_multipart_continue_wait_for_chunk() function when the buffer length falls within a specific range, causing an out-of-bounds heap read that writes data beyond the allocated receive buffer to a local IPC socket.
CVSS Score
MEDIUM
Related Weaknesses (CWE)
References
- https://github.com/sbabic/swupdate/commit/beee2dc0feef1cfe84f1aa6fc980e104b2e47a
- https://www.vulncheck.com/advisories/swupdate-integer-underflow-in-multipart-upl
FAQ
What is CVE-2026-28525?
CVE-2026-28525 is a vulnerability with a CVSS score of 6.8 (MEDIUM). SWUpdate contains an integer underflow vulnerability in the multipart upload parser in mongoose_multipart.c that allows unauthenticated attackers to cause a denial of service by sending a crafted HTTP...
How severe is CVE-2026-28525?
CVE-2026-28525 has been rated MEDIUM with a CVSS base score of 6.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28525?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.