CVE-2026-32955
Published: 20 April 2026
Summary
CVE-2026-32955 is a high-severity Stack-based Buffer Overflow (CWE-121) vulnerability in Silextechnology Sd-330Ac Firmware. Its CVSS base score is 8.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 14.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 SI-10 (Information Input Validation) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
SI-2 directly mitigates the buffer overflow vulnerability by requiring identification, reporting, and correction of the specific flaw through patching as outlined in vendor advisories.
SI-10 prevents exploitation by enforcing validation of redirect URL inputs to block oversized or malformed data that triggers the stack-based buffer overflow.
SI-16 protects against arbitrary code execution from the stack buffer overflow through safeguards like stack canaries, ASLR, and DEP.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Stack-based buffer overflow in redirect URL processing enables remote exploitation of a network-accessible (AV:N) application for arbitrary code execution (T1190: Exploit Public-Facing Application) and allows low-privileged attackers to escalate to full device compromise (T1068: Exploitation for Privilege Escalation).
NVD Description
SD-330AC and AMC Manager provided by silex technology, Inc. contain a stack-based buffer overflow vulnerability in processing the redirect URLs. Arbitrary code may be executed on the device.
Deeper analysisAI
CVE-2026-32955, published on 2026-04-20, is a stack-based buffer overflow vulnerability (CWE-121) affecting the SD-330AC and AMC Manager products provided by silex technology, Inc. The issue arises in the processing of redirect URLs, which can lead to arbitrary code execution on the device. It carries a CVSS v3.1 base score of 8.8 (AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H), reflecting its high severity due to network accessibility, low attack complexity, and significant impacts on confidentiality, integrity, and availability.
A low-privileged remote attacker can exploit this vulnerability over the network without requiring user interaction. By supplying a specially crafted redirect URL, the attacker triggers the buffer overflow, enabling arbitrary code execution on the affected device and full compromise of its security.
Mitigation details, including patches and workarounds, are outlined in advisories from the Japan Vulnerability Notes at https://jvn.jp/en/vu/JVNVU94271449/ and silex technology, Inc. at https://www.silex.jp/support/security-advisories/2026-001 and https://www.silex.jp/support/security-advisories/en/2026-001. Security practitioners should review these for deployment instructions specific to the affected products.
Details
- CWE(s)