Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2004-2026Improper Validation of Specified Type of Input in Pound

Severity
7.5HIGHNVD
EPSS
32.7%
top 3.12%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedDec 31
Latest updateMar 4

Description

Format string vulnerability in the logmsg function in svc.c for Pound 1.5 and earlier allows remote attackers to execute arbitrary code via format string specifiers in syslog messages.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages2 packages

Debianapsis/pound< 1.7-1+2
NVDapsis/pound6 versions+5

Patches

🔴Vulnerability Details

4
OSV
postgresql-14, postgresql-16, postgresql-17 vulnerabilities2026-03-04
GHSA
GHSA-rrwc-ph65-5p73: Format string vulnerability in the logmsg function in svc2022-04-29
CVEList
CVE-2004-2026: Format string vulnerability in the logmsg function in svc2005-05-10
OSV
CVE-2004-2026: Format string vulnerability in the logmsg function in svc2004-12-31

💥Exploits & PoCs

1
Exploit-DB
APSIS Pound 1.5 - Remote Format String2004-05-03

📋Vendor Advisories

2
Red Hat
postgresql: PostgreSQL intarray missing validation of type of input to selectivity estimator executes arbitrary code2026-02-12
Debian
CVE-2004-2026: pound - Format string vulnerability in the logmsg function in svc.c for Pound 1.5 and ea...2004
CVE-2004-2026 — Apsis Pound vulnerability | cvebase