CVE-2026-47314
Out-of-Bounds Write in Samsung Open Source Escargot
Publication date: 2026-05-19
Last updated on: 2026-05-19
Assigner: Samsung TV & Appliance
Description
Description
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| samsung | escargot | * |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-787 | The product writes data past the end, or before the beginning, of the intended buffer. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is an out-of-bounds write issue in Samsung Open Source Escargot. It allows buffer overflow, which means that the software writes data outside the boundaries of allocated memory buffers.
How can this vulnerability impact me? :
The vulnerability can lead to serious impacts including high confidentiality, integrity, and availability risks. Because it involves buffer overflow, it may allow attackers to execute arbitrary code, cause crashes, or corrupt data.
What immediate steps should I take to mitigate this vulnerability?
To mitigate this vulnerability, you should update the Samsung Open Source Escargot to the latest version that includes the fix for the out-of-bounds write issue.
The fix is available in the pull request #1565 on the Samsung Escargot GitHub repository.
Applying this update will prevent the overflow buffer issue and related crashes.