CVE-2026-29975

Published: Mag 08, 2026 Last Modified: Mag 08, 2026
ExploitDB:
Other exploit source:
Google Dorks:
HIGH 7,5
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Attack Vector: network
Attack Complexity: low
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: high

Description

AI Translation Available

lwjson 1.8.1 contains an improper input validation vulnerability in the streaming JSON parser (lwjson_stream.c). The end-of-string detection logic incorrectly identifies escaped quote characters by only checking the immediately preceding character rather than counting consecutive backslashes, causing valid JSON strings ending with an escaped backslash (like '\\') to never terminate parsing. A remote attacker can send well-formed JSON to cause applications using lwjson_stream_parse() to hang indefinitely, resulting in denial of service.

835

Loop with Unreachable Exit Condition ('Infinite Loop')

Incomplete
Common Consequences
Security Scopes Affected:
Availability
Potential Impacts:
Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Dos: Amplification
Applicable Platforms
All platforms may be affected
View CWE Details
https://gist.github.com/dwilliams27/b99fd41be5d6848691797042cbfc1103
https://gist.github.com/dwilliams27/b99fd41be5d6848691797042cbfc1103
https://github.com/MaJerle/lwjson/blob/develop/lwjson/src/lwjson/lwjson_stream.…
https://github.com/MaJerle/lwjson/tree/develop