CVE-2026-42469
Buffer Overflow in Open Vehicle Monitoring System 3
Publication date: 2026-05-01
Last updated on: 2026-05-01
Assigner: MITRE
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| open_vehicle_monitoring_system | open_vehicle_monitoring_system | 3.3.005 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-121 | A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function). |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a buffer overflow in the Open Vehicle Monitoring System 3 (OVMS3) version 3.3.005. Specifically, in the file canformat_canswitch.cpp, the parser does not properly validate the CANswitch DLC value. This improper validation allows remote attackers to send specially crafted CANswitch frames that can trigger the buffer overflow.
How can this vulnerability impact me? :
Exploitation of this vulnerability can allow remote attackers to cause a denial of service (DoS) on the affected system. Additionally, it may be possible for attackers to execute arbitrary code, potentially gaining control over the system.