Cyber Posture

CVE-2026-33847

High

Published: 24 March 2026

Published
24 March 2026
Modified
20 April 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0001 2.9th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33847 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability in Linkingvision Rapidvms. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 2.9th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 SI-16 (Memory Protection) and SI-2 (Flaw Remediation).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

SI-2 mandates timely flaw remediation, directly addressing this buffer overflow by applying the patch from PR#96.

prevent

SI-16 implements memory protections like ASLR and DEP to prevent exploitation of buffer overflows leading to arbitrary code execution.

prevent

SI-10 requires input validation to restrict malformed inputs that trigger the improper memory buffer operations in rapidvms.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Local buffer overflow (CWE-119) in client application enables arbitrary code execution when user opens/processes malformed input file, directly mapping to exploitation for client execution and malicious file user execution.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in linkingvision rapidvms.This issue affects rapidvms: before PR#96.

Deeper analysisAI

CVE-2026-33847 is an Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability, classified under CWE-119, affecting the linkingvision rapidvms software. This buffer overflow issue impacts versions of rapidvms prior to pull request PR#96. The vulnerability received a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), indicating high severity due to its potential for significant impact despite requiring local access and user interaction.

A local attacker with no privileges can exploit this vulnerability by tricking a user into performing an action that triggers the buffer overflow, such as processing malformed input. Successful exploitation allows arbitrary code execution with high impacts on confidentiality, integrity, and availability, potentially leading to full system compromise on the affected host.

The provided advisory reference, a GitHub pull request at https://github.com/linkingvision/rapidvms/pull/98, details the patch and mitigation. Security practitioners should update to rapidvms versions incorporating at least PR#96 or apply the fix from the referenced pull request to remediate the issue.

Details

CWE(s)

Affected Products

linkingvision
rapidvms
all versions

CVEs Like This One

CVE-2026-33849Same product: Linkingvision Rapidvms
CVE-2026-33848Same product: Linkingvision Rapidvms
CVE-2025-23397Shared CWE-119
CVE-2026-33851Shared CWE-119
CVE-2025-43264Shared CWE-119
CVE-2025-61144Shared CWE-119
CVE-2025-23398Shared CWE-119
CVE-2026-4710Shared CWE-119
CVE-2025-9185Shared CWE-119
CVE-2026-1260Shared CWE-119

References