CVE-2026-2967 PUBLISHED

Cesanta Mongoose TCP Sequence Number net_builtin.c getpeer verification of source

Assigner: VulDB
Reserved: 22.02.2026 Published: 23.02.2026 Updated: 23.02.2026

A security vulnerability has been detected in Cesanta Mongoose up to 7.20. This affects the function getpeer of the file /src/net_builtin.c of the component TCP Sequence Number Handler. The manipulation leads to improper verification of source of a communication channel. The attack may be initiated remotely. The attack's complexity is rated as high. The exploitability is reported as difficult. The exploit has been disclosed publicly and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Metrics

CVSS Vector: CVSS:4.0/AV:N/AC:H/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 6.3

Product Status

Vendor Cesanta
Product Mongoose
Versions
  • Version 7.0 is affected
  • Version 7.1 is affected
  • Version 7.2 is affected
  • Version 7.3 is affected
  • Version 7.4 is affected
  • Version 7.5 is affected
  • Version 7.6 is affected
  • Version 7.7 is affected
  • Version 7.8 is affected
  • Version 7.9 is affected
  • Version 7.10 is affected
  • Version 7.11 is affected
  • Version 7.12 is affected
  • Version 7.13 is affected
  • Version 7.14 is affected
  • Version 7.15 is affected
  • Version 7.16 is affected
  • Version 7.17 is affected
  • Version 7.18 is affected
  • Version 7.19 is affected
  • Version 7.20 is affected

Credits

  • dwbruijn (VulDB User) reporter

References

Problem Types

  • Improper Verification of Source of a Communication Channel CWE