No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Sat, 25 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A weakness has been identified in Cesanta Mongoose up to 7.20. This vulnerability affects the function handle_opt of the file /src/net_builtin.c of the component TCP Option Handler. This manipulation of the argument optlen causes infinite loop. The attack is possible to be carried out remotely. The exploit has been made available to the public and could be used for attacks. Upgrading to version 7.21 is able to resolve this issue. Upgrading the affected component is advised. VulDB has contacted the vendor early and they confirmed quickly, that this issue got fixed already. | |
| Title | Cesanta Mongoose TCP Option net_builtin.c handle_opt infinite loop | |
| First Time appeared |
Cesanta
Cesanta mongoose |
|
| Weaknesses | CWE-404 CWE-835 |
|
| CPEs | cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Cesanta
Cesanta mongoose |
|
| References |
| |
| Metrics |
cvssV2_0
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulDB
Published:
Updated: 2026-04-25T16:15:13.639Z
Reserved: 2026-04-24T19:12:47.755Z
Link: CVE-2026-6985
No data.
Status : Received
Published: 2026-04-25T17:16:33.520
Modified: 2026-04-25T17:16:33.520
Link: CVE-2026-6985
No data.
OpenCVE Enrichment
No data.