CVE-2026-2653Improper Restriction of Operations within the Bounds of a Memory Buffer in Project Admesh

Severity
4.8MEDIUMNVD
EPSS
0.0%
top 99.75%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedFeb 18

Description

A security flaw has been discovered in admesh up to 0.98.5. This issue affects the function stl_check_normal_vector of the file src/normals.c. Performing a manipulation results in heap-based buffer overflow. The attack must be initiated from a local position. The exploit has been released to the public and may be used for attacks. It looks like this product is not really maintained anymore.

CVSS vector

CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N

Affected Packages3 packages

debiandebian/admesh
CVEListV5admesh_project/admesh6 versions+5

🔴Vulnerability Details

2
GHSA
GHSA-vcj6-96x2-26j3: A security flaw has been discovered in admesh up to 02026-02-18
OSV
CVE-2026-2653: A security flaw has been discovered in admesh up to 02026-02-18

📋Vendor Advisories

1
Debian
CVE-2026-2653: admesh - A security flaw has been discovered in admesh up to 0.98.5. This issue affects t...2026

🕵️Threat Intelligence

1
Wiz
CVE-2026-2653 Impact, Exploitability, and Mitigation Steps | Wiz