CVE-2026-33851
Published: 24 March 2026
Summary
CVE-2026-33851 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability. Its CVSS base score is 7.8 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 3.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-16 (Memory Protection).
Threat & Defense at a Glance
Threat & Defense Details
Mitigating Controls (NIST 800-53 r5)AI
Directly mitigates the buffer overflow vulnerability by requiring timely remediation through patching doslib to version 20250729 or later.
Implements memory protections that prevent exploitation of buffer overflows like CVE-2026-33851 by restricting unauthorized memory access, modification, or execution.
Enables vulnerability scanning to identify the presence of vulnerable doslib versions affected by this buffer overflow CVE.
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Buffer overflow (CWE-119) in doslib enables arbitrary code execution when a user processes attacker-supplied malicious input/file; directly maps to client-side exploitation (T1203) via user-executed malicious file (T1204.002).
NVD Description
Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in joncampbell123 doslib.This issue affects doslib: before doslib-20250729.
Deeper analysisAI
CVE-2026-33851 is an Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability, corresponding to CWE-119, in the doslib library maintained by joncampbell123. This buffer overflow flaw affects doslib versions prior to 20250729 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), reflecting high severity due to substantial impacts on confidentiality, integrity, and availability.
The vulnerability can be exploited by a local attacker with no required privileges who tricks a user into interacting with a malicious input, such as running a specially crafted file or command processed by doslib. Successful exploitation enables high-impact outcomes, including potential arbitrary code execution, data corruption, or system crashes on the affected local system.
Mitigation is available via the patch in the GitHub pull request at https://github.com/joncampbell123/doslib/pull/65. Affected users should upgrade to doslib-20250729 or later to address the issue.
Details
- CWE(s)