Vulnerability Description
A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) during wildcard hostname validation when the LEFT_MOST_WILDCARD_ONLY flag is active. If a wildcard * exhausts the entire hostname string, the function reads one byte past the buffer without a bounds check, which could cause a crash.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Wolfssl | Wolfssl | < 5.9.1 |
Related Weaknesses (CWE)
References
- https://github.com/wolfSSL/wolfssl/pull/10119Issue TrackingPatch
FAQ
What is CVE-2026-5772?
CVE-2026-5772 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A 1-byte stack buffer over-read was identified in the MatchDomainName function (src/internal.c) during wildcard hostname validation when the LEFT_MOST_WILDCARD_ONLY flag is active. If a wildcard * ex...
How severe is CVE-2026-5772?
CVE-2026-5772 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-5772?
Check the references section above for vendor advisories and patch information. Affected products include: Wolfssl Wolfssl.