Home

Description

A vulnerability was found in ThakeeNathees pocketlang up to cc73ca61b113d48ee130d837a7a8b145e41de5ce. The affected element is the function pkByteBufferAddString. The manipulation of the argument length with the input 4294967290 results in memory corruption. The attack requires a local approach. The exploit has been made public and could be used. This product does not use versioning. This is why information about affected and unaffected releases are unavailable. The project was informed of the problem early through an issue report but has not responded yet.

PUBLISHED Reserved 2026-03-11 | Published 2026-03-12 | Updated 2026-03-12 | Assigner VulDB




MEDIUM: 4.8CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:P
LOW: 3.3CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
LOW: 3.3CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:L/E:P/RL:X/RC:R
1.7AV:L/AC:L/Au:S/C:N/I:N/A:P/E:POC/RL:ND/RC:UR

Problem types

Memory Corruption

Product status

cc73ca61b113d48ee130d837a7a8b145e41de5ce
affected

Timeline

2026-03-11:Advisory disclosed
2026-03-11:VulDB entry created
2026-03-11:VulDB entry last update

Credits

Oneafter (VulDB User) reporter

References

vuldb.com/?id.350533 (VDB-350533 | ThakeeNathees pocketlang pkByteBufferAddString memory corruption) vdb-entry technical-description

vuldb.com/?ctiid.350533 (VDB-350533 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.769773 (Submit #769773 | ThakeeNathees pocketlang master-branch Integer Overflow) third-party-advisory

github.com/ThakeeNathees/pocketlang/issues/302 exploit issue-tracking

github.com/oneafter/0211/blob/main/po/repro exploit

github.com/ThakeeNathees/pocketlang/ exploit product

cve.org (CVE-2026-4010)

nvd.nist.gov (CVE-2026-4010)

Download JSON