JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp.
History

Mon, 04 May 2026 16:15:00 +0000

Type Values Removed Values Added
First Time appeared Js8call
Js8call js8call
Js8call js8call-improved
Vendors & Products Js8call
Js8call js8call
Js8call js8call-improved

Sat, 02 May 2026 00:00:00 +0000

Type Values Removed Values Added
Title Stack-Based Buffer Overflow in JS8Call via APRSIS Transmission

Fri, 01 May 2026 22:45:00 +0000


Fri, 01 May 2026 14:30:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 01 May 2026 07:45:00 +0000

Type Values Removed Values Added
Description JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp. JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp.

Fri, 01 May 2026 07:00:00 +0000

Type Values Removed Values Added
Description JS8Call through 2.3.1 and JS8Call-improved before 3.0 have a stack-based buffer overflow via a radio transmission of @APRSIS GRID followed by a long Maidenhead locator. This occurs in grid2deg in APRSISClient.cpp.
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 10, 'vector': 'CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/S:P/AU:Y/R:U/V:D/RE:M/U:Green'}


cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2026-05-01T22:10:45.285Z

Reserved: 2026-05-01T06:42:18.918Z

Link: CVE-2026-42996

cve-icon Vulnrichment

Updated: 2026-05-01T13:24:29.761Z

cve-icon NVD

Status : Deferred

Published: 2026-05-01T07:15:59.787

Modified: 2026-05-01T23:16:18.233

Link: CVE-2026-42996

cve-icon Redhat

No data.