CVE-2026-2966

A weakness has been identified in Cesanta Mongoose up to 7.20. The impacted element is the function mg_sendnsreq of the file /src/dns.c of the component DNS Transaction ID Handler. Executing a manipulation of the argument random can lead to insufficiently random values. The attack can be launched remotely. The attack requires a high level of complexity. The exploitability is regarded as difficult. The exploit has been made available to the public and could be used for attacks. The vendor was contacted early about this disclosure but did not respond in any way.
References
Link Resource
https://github.com/dwBruijn/CVEs/blob/main/Mongoose/mg_sendnsreq.md Exploit Third Party Advisory
https://github.com/dwBruijn/CVEs/blob/main/Mongoose/mg_sendnsreq.md#poc Exploit Third Party Advisory
https://vuldb.com/?ctiid.347333 Permissions Required VDB Entry
https://vuldb.com/?id.347333 Third Party Advisory VDB Entry
https://vuldb.com/?submit.755304 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

cpe:2.3:a:cesanta:mongoose:*:*:*:*:*:*:*:*

History

No history.

Information

Published : 2026-02-23 03:15

Updated : 2026-02-23 20:18


NVD link : CVE-2026-2966

Mitre link : CVE-2026-2966

CVE.ORG link : CVE-2026-2966


JSON object : View

Products Affected

cesanta

  • mongoose
CWE
CWE-310

Cryptographic Issues

CWE-330

Use of Insufficiently Random Values