CVE-2026-47314
Undergoing Analysis Undergoing Analysis - In Progress
Out-of-Bounds Write in Samsung Open Source Escargot

Publication date: 2026-05-19

Last updated on: 2026-05-19

Assigner: Samsung TV & Appliance

Description
Out-of-bounds write vulnerability in Samsung Open Source Escargot allows Overflow Buffers. This issue affects Escargot: 590345cc6258317c5da850d846ce6baaf2afc2d3.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-19
Last Modified
2026-05-19
Generated
2026-05-20
AI Q&A
2026-05-19
EPSS Evaluated
2026-05-19
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
samsung escargot *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-787 The product writes data past the end, or before the beginning, of the intended buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is an out-of-bounds write issue in Samsung Open Source Escargot. It allows buffer overflow, which means that the software writes data outside the boundaries of allocated memory buffers.


How can this vulnerability impact me? :

The vulnerability can lead to serious impacts including high confidentiality, integrity, and availability risks. Because it involves buffer overflow, it may allow attackers to execute arbitrary code, cause crashes, or corrupt data.


What immediate steps should I take to mitigate this vulnerability?

To mitigate this vulnerability, you should update the Samsung Open Source Escargot to the latest version that includes the fix for the out-of-bounds write issue.

The fix is available in the pull request #1565 on the Samsung Escargot GitHub repository.

Applying this update will prevent the overflow buffer issue and related crashes.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart