Cyber Posture

CVE-2026-33851

High

Published: 24 March 2026

Published
24 March 2026
Modified
05 May 2026
KEV Added
Patch
CVSS Score 7.8 CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
EPSS Score 0.0001 3.5th percentile
Risk Priority 16 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-33851 is a high-severity Improper Restriction of Operations within the Bounds of a Memory Buffer (CWE-119) vulnerability. Its CVSS base score is 7.8 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Exploitation for Client Execution (T1203); ranked at the 3.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.

The strongest mitigations our analysis identified are NIST 800-53 RA-5 (Vulnerability Monitoring and Scanning) and SI-16 (Memory Protection).

Threat & Defense at a Glance

What attackers do: exploitation maps to Exploitation for Client Execution (T1203) and 1 other technique. What defenders deploy: see the NIST 800-53 controls recommended below.
Threat & Defense Details

Mitigating Controls (NIST 800-53 r5)AI

prevent

Directly mitigates the buffer overflow vulnerability by requiring timely remediation through patching doslib to version 20250729 or later.

prevent

Implements memory protections that prevent exploitation of buffer overflows like CVE-2026-33851 by restricting unauthorized memory access, modification, or execution.

detect

Enables vulnerability scanning to identify the presence of vulnerable doslib versions affected by this buffer overflow CVE.

MITRE ATT&CK Enterprise TechniquesAI

T1203 Exploitation for Client Execution Execution
Adversaries may exploit software vulnerabilities in client applications to execute code.
T1204.002 Malicious File Execution
An adversary may rely upon a user opening a malicious file in order to gain execution.
Why these techniques?

Buffer overflow (CWE-119) in doslib enables arbitrary code execution when a user processes attacker-supplied malicious input/file; directly maps to client-side exploitation (T1203) via user-executed malicious file (T1204.002).

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability in joncampbell123 doslib.This issue affects doslib: before doslib-20250729.

Deeper analysisAI

CVE-2026-33851 is an Improper Restriction of Operations within the Bounds of a Memory Buffer vulnerability, corresponding to CWE-119, in the doslib library maintained by joncampbell123. This buffer overflow flaw affects doslib versions prior to 20250729 and carries a CVSS v3.1 base score of 7.8 (AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H), reflecting high severity due to substantial impacts on confidentiality, integrity, and availability.

The vulnerability can be exploited by a local attacker with no required privileges who tricks a user into interacting with a malicious input, such as running a specially crafted file or command processed by doslib. Successful exploitation enables high-impact outcomes, including potential arbitrary code execution, data corruption, or system crashes on the affected local system.

Mitigation is available via the patch in the GitHub pull request at https://github.com/joncampbell123/doslib/pull/65. Affected users should upgrade to doslib-20250729 or later to address the issue.

Details

CWE(s)

CVEs Like This One

CVE-2026-33847Shared CWE-119
CVE-2025-23397Shared CWE-119
CVE-2025-43264Shared CWE-119
CVE-2025-61144Shared CWE-119
CVE-2025-23398Shared CWE-119
CVE-2026-4710Shared CWE-119
CVE-2025-9185Shared CWE-119
CVE-2026-1260Shared CWE-119
CVE-2025-2750Shared CWE-119
CVE-2026-5317Shared CWE-119

References