{"id":"CVE-2021-26788","details":"Oryx Embedded CycloneTCP 1.7.6 to 2.0.0, fixed in 2.0.2, is affected by incorrect input validation, which may cause a denial of service (DoS). To exploit the vulnerability, an attacker needs to have TCP connectivity to the target system. Receiving a maliciously crafted TCP packet from an unauthenticated endpoint is sufficient to trigger the bug.","modified":"2026-03-14T00:45:37.381805Z","published":"2021-03-08T13:15:12.737Z","references":[{"type":"FIX","url":"https://github.com/Oryx-Embedded/CycloneTCP/commit/de5336016edbe1e90327d0ed1cba5c4e49114366?branch=de5336016edbe1e90327d0ed1cba5c4e49114366&diff=split"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/oryx-embedded/cyclonetcp","events":[{"introduced":"07ad133815eaaac4b6a329faf967fe866b06e2c9"},{"last_affected":"248b6e2063906d2c98a096d235cb008424d72fa6"},{"fixed":"de5336016edbe1e90327d0ed1cba5c4e49114366"}],"database_specific":{"versions":[{"introduced":"1.7.6"},{"last_affected":"2.0.0"}]}}],"versions":["v1.7.6","v1.7.8","v1.8.0","v1.8.2","v1.8.6","v1.9.0","v1.9.2","v1.9.4","v1.9.6","v1.9.8","v2.0.0"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-26788.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}]}