Zero Day MonitorZDM
DashboardVulnerabilitiesTrendingZero-DaysNewsAbout
Login
ImpressumPrivacy Policy
Zero Day Monitor © 2026
2741 articles · 110470 vulns · 36/41 feeds (7d)
← Back to list
—
CVE-2026-5187EXPLOITED
wolfssl · wolfcrypt

Heap Out-of-Bounds Write in DecodeObjectId() in wolfSSL

Description

A vulnerability was found in wolfSSL up to 5.9.0 and classified as critical. The impacted element is the function DecodeObjectId of the file wolfcrypt/src/asn.c. The manipulation results in heap-based buffer overflow. This vulnerability is reported as CVE-2026-5187. The attack can be launched remotely.

Affected Products

VendorProductVersions
wolfsslwolfcrypt0, 5.9.0

References

  • https://github.com/wolfSSL/wolfssl

Related News (2 articles)

Tier C
oss-security8h ago
wolfSSL 5.9.1 CVE and non-CVE fixes
→ No new info (linked only)
Tier C
VulDB4d ago
CVE-2026-5187 | wolfSSL up to 5.9.0 wolfcrypt/src/asn.c DecodeObjectId heap-based overflow
→ No new info (linked only)
CISA KEV❌ No
Actively exploited✅ Yes
CWECWE-122, CWE-787
PublishedApr 9, 2026
Last enriched4d agov2
Trending Score59
Source articles2
Independent2
Info Completeness7/14
Missing: cvss, epss, kev, exploit, patch, iocs, mitre_attack

Community Vote

0
Login to vote
0 upvotes0 downvotes
No votes yet

Related CVEs (5)

CRITICALCVE-2026-5194EXP
wolfSSL ECDSA Certificate Verification
Trending: 74
NONECVE-2026-5393EXP
OOB Read in DoTls13CertificateVerify with WOLFSSL_DUAL_ALG_CERTS
Trending: 59
NONECVE-2026-5446EXP
wolfSSL ARIA-GCM TLS 1.2/DTLS 1.2 GCM nonce reuse
Trending: 49
NONECVE-2026-5501EXP
Improper Certificate Signature Verification in X.509 Chain Validation Allows Forged Leaf Certificates
Trending: 28
NONECVE-2026-5477EXP
Prefix-substitution forgery via integer overflow in wolfCrypt CMAC
Trending: 26

Pin to Dashboard

Verification

State: unverified
Confidence: 0%

Vulnerability Timeline

CVE Published
Apr 9, 2026
Actively Exploited
Apr 9, 2026
Discovered by ZDM
Apr 9, 2026
Updated: description, affectedVersions, severity, activelyExploited
Apr 9, 2026

Version History

v2
Last enriched 4d ago
v2Tier C4d ago

Updated description with critical classification, added affected version 5.9.0, and changed severity to CRITICAL.

descriptionaffectedVersionsseverityactivelyExploited
via VulDB
v14d ago

Initial creation