CVE-2026-7675
Published: 03 May 2026
Description
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
Security Summary
CVE-2026-7675 is a buffer overflow vulnerability affecting Shenzhen Libituo Technology's LBT-T300-HW1 device firmware versions up to 1.2.8. The issue resides in the start_lan function within the /apply.cgi file, where manipulation of the Channel/ApCliSsid argument triggers the overflow. Classified under CWE-119 and CWE-120, it carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact.
A remote attacker with low privileges, such as an authenticated user, can exploit this vulnerability over the network with low complexity and no user interaction required. Successful exploitation allows high levels of impact on confidentiality, integrity, and availability, likely enabling arbitrary code execution or system compromise through the buffer overflow.
No patches or official mitigations are available, as the vendor was contacted early regarding the disclosure but provided no response. An exploit has been publicly disclosed, including details on GitHub, increasing the risk of active exploitation. Security practitioners should isolate affected devices, restrict access to /apply.cgi, and monitor for anomalous activity, as referenced in VulDB entries.
Details
- CWE(s)
MITRE ATT&CK Enterprise Techniques
Why these techniques?
Buffer overflow in network-accessible /apply.cgi web interface of device firmware enables remote authenticated attackers to achieve arbitrary code execution/system compromise, directly mapping to exploitation of a public-facing application.