Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-7270— Local privilege escalation via execve()

EPSS 0.01% · P3
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-7270

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Local privilege escalation via execve()
Source: NVD (National Vulnerability Database)
Vulnerability Description
An operator precedence bug in the kernel results in a scenario where a buffer overflow causes attacker-controlled data to overwrite adjacent execve(2) argument buffers. The bug may be exploitable by an unprivileged user to obtain superuser privileges.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
操作符优先级逻辑错误
Source: NVD (National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
FreeBSDFreeBSD 15.0-RELEASE ~ p7 -

II. Public POCs for CVE-2026-7270

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-7270

Please Login to view more intelligence information

Same Patch Batch · FreeBSD · 2026-04-30 · 6 CVEs total

CVE-2026-42511Remote code execution via malicious DHCP options
CVE-2026-7164pf can overflow the stack parsing crafted SCTP packets
CVE-2026-42512Remotely triggerable out-of-bounds heap write in dhclient
CVE-2026-35547Heap overflow in libnv
CVE-2026-39457Stack overflow via select() file descriptor set overflow

IV. Related Vulnerabilities

V. Comments for CVE-2026-7270

Anonymous User
2026-05-09 03:31:38

为什么cpe影响域只有FreeBSD,然后描述中显示影响linux


Leave a comment