CVE-2026-32961
Heap-Based Buffer Overflow in Silex SD-330AC Causes DoS
Publication date: 2026-04-20
Last updated on: 2026-04-22
Assigner: JPCERT/CC
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| silextechnology | sd-330ac_firmware | to 1.50 (exc) |
| silextechnology | amc_manager | to 5.1.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-122 | A heap overflow condition is a buffer overflow, where the buffer that can be overwritten is allocated in the heap portion of memory, generally meaning that the buffer was allocated using a routine such as malloc(). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability exists in the SD-330AC and AMC Manager products provided by silex technology, Inc. It is a heap-based buffer overflow in the packet data processing component called sx_smpd. When a specially crafted packet is processed, it can trigger this overflow.
The result of exploiting this vulnerability is a temporary denial-of-service (DoS) condition, meaning the affected device or service may become unavailable or unresponsive for a period of time.
How can this vulnerability impact me? :
Exploitation of this vulnerability can cause a temporary denial-of-service (DoS) condition on the affected devices. This means that the SD-330AC or AMC Manager may stop functioning properly or become unresponsive, potentially disrupting network operations or services that rely on these devices.
How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:
The provided information does not specify any impact of this vulnerability on compliance with common standards and regulations such as GDPR or HIPAA.