Home

Description

Out-of-bounds Write, Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') vulnerability in FASTSHIFT X-TRACK (Software/X-Track/USER/App/Utils/lv_img_png/PNGdec/src modules). This vulnerability is associated with program files inflate.C. This issue affects X-TRACK: through v2.7.

PUBLISHED Reserved 2026-01-27 | Published 2026-01-27 | Updated 2026-01-27 | Assigner GovTech CSG




CRITICAL: 10.0CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:N/AU:Y/R:U/V:C/RE:L/U:Red

Problem types

CWE-787 Out-of-bounds Write

CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

Product status

Default status
affected

Any version
affected

Credits

TITAN Team (titancaproject@gmail.com) reporter

References

github.com/FASTSHIFT/X-TRACK/pull/120 patch

cve.org (CVE-2026-24823)

nvd.nist.gov (CVE-2026-24823)

Download JSON