Stack-Based Buffer Overflow in JS8Call by JS8Call-improved
CVE-2026-42996

10CRITICAL

Key Information:

Vendor

Js8call

Vendor
CVE Published:
1 May 2026

What is CVE-2026-42996?

A stack-based buffer overflow exists in JS8Call versions up to 2.3.1 and JS8Call-improved prior to 3.0. This vulnerability occurs when processing a radio transmission of the @APRSIS GRID, which is followed by an excessively long Maidenhead locator string. The flaw is located in the grid2deg function within the APRSISClient.cpp file, allowing attackers to exploit the vulnerability by crafting malicious radio messages, potentially leading to unexpected behavior and system crashes.

Affected Version(s)

JS8Call 0 <= 2.3.1

JS8Call-improved 0 < 3.0

References

CVSS V4

Score:
10
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
None
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.