Stack Buffer Overflow Vulnerability in GPAC Multimedia Framework
CVE-2026-27821

7.7HIGH

Key Information:

Vendor

Gpac

Status
Vendor
CVE Published:
26 February 2026

What is CVE-2026-27821?

The GPAC Multimedia Framework, an open-source project, is susceptible to a stack buffer overflow vulnerability when processing NHML files. This issue arises in the 'src/filters/dmx_nhml.c' file, where the xmlHeaderEnd attribute's value can exceed its allocated buffer size of 1000 bytes due to the unsafe use of the 'strcpy()' function. This oversight allows for potential stack memory corruption, thus exposing the application to various security threats. A patch has been implemented in commit 9bd7137fded2db40de61a2cf3045812c8741ec52 to address this vulnerability.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

gpac <= 26.02.0

References

CVSS V4

Score:
7.7
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.