CVE-2026-33554
Awaiting Analysis Awaiting Analysis - Queue
Buffer Overflow in FreeIPMI ipmi-oem Commands Enables Exploitation

Publication date: 2026-03-24

Last updated on: 2026-03-24

Assigner: MITRE

Description
ipmi-oem in FreeIPMI before 1.16.17 has exploitable buffer overflows on response messages. The Intelligent Platform Management Interface (IPMI) specification defines a set of interfaces for platform management. It is implemented by a large number of hardware manufacturers to support system management. It is most commonly used for sensor reading (e.g., CPU temperatures through the ipmi-sensors command within FreeIPMI) and remote power control (the ipmipower command). The ipmi-oem client command implements a set of a IPMI OEM commands for specific hardware vendors. If a user has supported hardware, they may wish to use the ipmi-oem command to send a request to a server to retrieve specific information. Three subcommands were found to have exploitable buffer overflows on response messages. They are: "ipmi-oem dell get-last-post-code - get the last POST code and string describing the error on some Dell servers," "ipmi-oem supermicro extra-firmware-info - get extra firmware info on Supermicro servers," and "ipmi-oem wistron read-proprietary-string - read a proprietary string on Wistron servers."
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-24
Last Modified
2026-03-24
Generated
2026-05-06
AI Q&A
2026-03-24
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
freeipmi freeipmi to 1.16.17 (exc)
gnu freeipmi to 1.16.17 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability exists in the ipmi-oem client command of FreeIPMI versions before 1.16.17. It involves exploitable buffer overflows in response messages for three specific subcommands related to hardware vendor-specific IPMI OEM commands. These subcommands are used to retrieve information from servers made by Dell, Supermicro, and Wistron. The buffer overflow occurs when the response messages from these commands are processed, potentially allowing an attacker to exploit the overflow.


How can this vulnerability impact me? :

The buffer overflow vulnerability in ipmi-oem could allow an attacker to execute arbitrary code or cause a denial of service on affected systems by sending crafted response messages. Since ipmi-oem is used for system management tasks such as sensor reading and remote power control, exploitation could lead to unauthorized control or disruption of server management functions.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart