Vulnerability Description
JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp.
Related Weaknesses (CWE)
References
- https://amateur-radio-resources.sourceforge.io/PDF/JS8APRS.pdf
- https://github.com/JS8Call-improved/JS8Call-improved/commit/a6c7a19b82bbd7c2c0c8
- https://github.com/JS8Call-improved/JS8Call-improved/security/advisories/GHSA-98
- https://github.com/js8call/js8call/blob/fd721e8b67eed84cb3c09d018205ab9a53e1a8b1
- https://github.com/JS8Call-improved/JS8Call-improved/security/advisories/GHSA-98
FAQ
What is CVE-2026-42996?
CVE-2026-42996 is a documented vulnerability. JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRS...
How severe is CVE-2026-42996?
CVSS scoring is not yet available for CVE-2026-42996. Check NVD for updates.
Is there a patch for CVE-2026-42996?
Check the references section above for vendor advisories and patch information. Review vendor security bulletins for remediation guidance.