Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-37554

CVSS 7.5 · High EPSS 0.06% · P18
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-37554

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
An issue was discovered in Vanetza V2X v26.02 allowing remote unauthorized attackers to cause a denial of service. The vulnerability exists in the GeoNetworking packet processing pipeline where OpenSSL exceptions from ECC point validation (invalid compressed point, point not on curve) are not properly caught by the Router::indicate() call chain. The openssl_wrapper.cpp check() function (line 19) throws openssl::Exception when OpenSSL operations fail. The parser's catch block in parse_secured() should catch these, but the exception escapes through subsequent processing stages (indicate_common, indicate_extended). This causes std::terminate, crashing the V2X receiver.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
Vanetza 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Vanetza是Raphael Riebl个人开发者的一个车载通信协议套件的开源实现。 Vanetza v26.02版本存在安全漏洞,该漏洞源于GeoNetworking数据包处理管道中OpenSSL异常未被Router::indicate调用链正确捕获,导致std::terminate崩溃,可能造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-n/a n/a -

II. Public POCs for CVE-2026-37554

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-37554

登录查看更多情报信息。

Same Patch Batch · n/a · 2026-05-01 · 53 CVEs total

CVE-2026-3754110.0 CRITICALOpen-Vehicle-Monitoring-System-3 安全漏洞
CVE-2026-375399.8 CRITICALcannelloni 安全漏洞
CVE-2026-375319.8 CRITICALAutomotive Grade Linux app-framework-main 路径遍历漏洞
CVE-2026-375368.8 HIGHUnified Diagnostic Services Support Library in C 安全漏洞
CVE-2026-375528.4 HIGHMix PHP 代码问题漏洞
CVE-2026-375408.4 HIGHopen-amp 输入验证错误漏洞
CVE-2026-375378.1 HIGHOpen SAE J1939 输入验证错误漏洞
CVE-2026-375267.8 HIGHAutomotive Grade Linux app-framework-binder 访问控制错误漏洞
CVE-2026-375257.8 HIGHAutomotive Grade Linux app-framework-binder 安全漏洞
CVE-2026-75987.3 HIGHlibssh2 userauth.c userauth_password integer overflow
CVE-2026-375357.1 HIGHISO-TP (ISO 15765-2) Support Library in C 缓冲区错误漏洞
CVE-2026-375327.1 HIGHAutomotive Grade Linux agl-service-can-low-level 安全漏洞
CVE-2026-375036.9 MEDIUMV2Board 跨站脚本漏洞
CVE-2026-75365.3 MEDIUMOpen5GS BSF pcfBindings bsf_sess_add_by_ip_address denial of service
CVE-2026-75805.3 MEDIUMExiftool JPEG/QuickTime/MOV/MP4 GM.pm Process_mrld code injection
CVE-2026-375045.3 MEDIUMV2Board 安全漏洞
CVE-2026-375054.9 MEDIUMV2Board SQL注入漏洞
CVE-2026-75784.7 MEDIUMMacCMS Pro Plugin Installation add.html install unrestricted upload
CVE-2026-75874.3 MEDIUMOpen5GS AMF nsmf-handler.c amf_nsmf_pdusession_handle_update_sm_context denial of service
CVE-2026-75184.3 MEDIUMOpen5GS AMF SBI Endpoint sdmsubscription-notify amf_namf_callback_handle_sdm_data_change_n

Showing top 20 of 53 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-37554

No comments yet


Leave a comment