CVE-2026-8275
Received Received - Intake
Integer Overflow in Bettercap IPP Service

Publication date: 2026-05-11

Last updated on: 2026-05-11

Assigner: VulDB

Description
A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-05-11
Last Modified
2026-05-11
Generated
2026-05-11
AI Q&A
2026-05-11
EPSS Evaluated
N/A
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
bettercap bettercap to 2.41.5 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-192 Integer coercion refers to a set of flaws pertaining to the type casting, extension, or truncation of primitive data types.
CWE-189
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2026-8275 is a vulnerability in bettercap versions up to 2.41.5 affecting the ippReadChunkedBody function in the zerogod IPP Service component. The flaw arises when the function processes a maliciously crafted chunked HTTP request with an extremely large chunk size, causing an integer coercion error that leads to an out-of-bounds memory allocation.

Specifically, the vulnerability is triggered by sending a chunk size value of 0xFFFFFFFFFFFFFFFF (the maximum uint64 value). This value is parsed and converted improperly, resulting in an invalid slice length allocation that causes a panic and crashes the entire bettercap process.

The attack can be initiated remotely without authentication by sending a single crafted request to the IPP TCP port. The exploit causes a denial-of-service (DoS) condition by crashing the application.

The patch to fix this vulnerability introduces a maximum chunk size validation (10 MB) to reject oversized chunks before allocation and adds a recover() mechanism to handle panics gracefully, preventing the entire process from crashing.


How can this vulnerability impact me? :

This vulnerability can impact you by allowing a remote attacker to cause a denial-of-service (DoS) on the bettercap application. By sending a specially crafted chunked HTTP request with an extremely large chunk size, the attacker can crash the bettercap process.

The crash occurs because the application attempts to allocate an invalid amount of memory, leading to a panic that is not recovered within the affected goroutine. This results in the entire bettercap service becoming unavailable.

Since the attack requires no authentication and can be executed remotely with a single request, it poses a significant risk to availability of services relying on bettercap's IPP functionality.


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring network traffic for suspicious chunked HTTP requests sent to the bettercap IPP TCP port (default 63100) that contain unusually large chunk sizes, especially the maximum uint64 value (0xFFFFFFFFFFFFFFFF).

A practical detection method involves capturing and analyzing network packets targeting port 63100 for HTTP/1.1 requests with headers "Expect: 100-continue" and "Transfer-Encoding: chunked" followed by an abnormally large chunk size.

Example commands to detect such activity include:

  • Using tcpdump to capture suspicious packets: tcpdump -i <interface> port 63100 -A | grep -E 'Expect: 100-continue|Transfer-Encoding: chunked|0xFFFFFFFFFFFFFFFF'
  • Using Wireshark to filter traffic on port 63100 and inspect chunked HTTP requests for oversized chunk sizes.
  • Monitoring bettercap process logs for crashes or panics related to the ippReadChunkedBody function, which may indicate exploitation attempts.

What immediate steps should I take to mitigate this vulnerability?

The primary mitigation step is to apply the official patch that fixes the vulnerability by adding a maximum chunk size validation (10 MB) and a recover() mechanism to handle panics gracefully.

If patching immediately is not possible, consider restricting or blocking incoming traffic to the bettercap IPP TCP port (default 63100) from untrusted or unauthenticated sources to prevent exploitation.

Additionally, monitor the bettercap service for unexpected crashes or denial-of-service symptoms and restart the service if necessary.

Long-term mitigation involves updating bettercap to a version that includes the patch identified by commit 3731d5576cffae9eefe3721cd46a40933304129f.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

The provided information does not specify any direct impact of CVE-2026-8275 on compliance with common standards and regulations such as GDPR or HIPAA.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart