Home

Description

SoftEtherVPN is a an open-source cross-platform multi-protocol VPN Program. In 5.2.5188 and earlier, a pre-authentication denial-of-service vulnerability exists in SoftEther VPN Developer Edition 5.2.5188 (and likely earlier versions of Developer Edition). An unauthenticated remote attacker can crash the vpnserver process by sending a single malformed EAP-TLS packet over raw L2TP (UDP/1701), terminating all active VPN sessions.

PUBLISHED Reserved 2026-04-06 | Published 2026-04-07 | Updated 2026-04-07 | Assigner GitHub_M




HIGH: 7.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Problem types

CWE-789: Memory Allocation with Excessive Size Value

Product status

<= 5.2.5188
affected

References

github.com/...herVPN/security/advisories/GHSA-q5g3-qhc6-pr3h exploit

github.com/...herVPN/security/advisories/GHSA-q5g3-qhc6-pr3h

cve.org (CVE-2026-39312)

nvd.nist.gov (CVE-2026-39312)

Download JSON