Cyber Posture

CVE-2026-32955

High

Published: 20 April 2026

Published
20 April 2026
Modified
22 April 2026
KEV Added
Patch
CVSS Score 8.8 CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
EPSS Score 0.0005 14.9th percentile
Risk Priority 18 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32955 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Silextechnology Sd-330Ac Firmware. Its CVSS base score is 8.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploit Public-Facing Application (T1190) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 directly mitigates the buffer overflow vulnerability by requiring identification, reporting, and correction of the specific flaw through patching as outlined in vendor advisories.

prevent

SI-10 prevents exploitation by enforcing validation of redirect URL inputs to block oversized or malformed data that triggers the stack-based buffer overflow.

prevent

SI-16 protects against arbitrary code execution from the stack buffer overflow through safeguards like stack canaries, ASLR, and DEP.

MITRE ATT&CK Enterprise TechniquesAI

T1190 Exploit Public-Facing Application Initial Access
Adversaries may attempt to exploit a weakness in an Internet-facing host or system to initially access a network.
T1068 Exploitation for Privilege Escalation Privilege Escalation
Adversaries may exploit software vulnerabilities in an attempt to elevate privileges.
Why these techniques?

Stack-based buffer overflow in redirect URL processing enables remote exploitation of a network-accessible (AV:N) application for arbitrary code execution (T1190: Exploit Public-Facing Application) and allows low-privileged attackers to escalate to full device compromise (T1068: Exploitation for Privilege Escalation).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

SD-330AC and AMC Manager provided by silex technology, Inc. contain a stack-based buffer overflow vulnerability in processing the redirect URLs. Arbitrary code may be executed on the device.

Deeper analysisAI

CVE-2026-32955, published on 2026-04-20, is a stack-based buffer overflow vulnerability (CWE-121) affecting the SD-330AC and AMC Manager products provided by silex technology, Inc. The issue arises in the processing of redirect URLs, which can lead to arbitrary code execution on the device. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.

A low-privileged remote attacker can exploit this vulnerability over the network without requiring user interaction. By supplying a specially crafted redirect URL, the attacker triggers the buffer overflow, enabling arbitrary code execution on the affected device and full compromise of its security.

Mitigation details, including patches and workarounds, are outlined in advisories from the Japan Vulnerability Notes at https://jvn.jp/en/vu/JVNVU94271449/ and silex technology, Inc. at https://www.silex.jp/support/security-advisories/2026-001 and https://www.silex.jp/support/security-advisories/en/2026-001. Security practitioners should review these for deployment instructions specific to the affected products.

Details

CWE(s)

Affected Products

silextechnology
sd-330ac firmware
≤ 1.50
silextechnology
amc manager
≤ 5.1.0

CVEs Like This One

CVE-2026-32965Same product: Silextechnology Amc Manager
CVE-2026-32956Same product: Silextechnology Amc Manager
CVE-2025-26506Shared CWE-121
CVE-2025-22467Shared CWE-121
CVE-2026-1457Shared CWE-121
CVE-2025-32061Shared CWE-121
CVE-2025-26507Shared CWE-121
CVE-2025-70219Shared CWE-121
CVE-2025-61128Shared CWE-121
CVE-2019-25319Shared CWE-121

References