CVE-2026-8275

Published: Mag 11, 2026 Last Modified: Mag 11, 2026
ExploitDB:
Other exploit source:
Google Dorks:
LOW 2,9
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW 3,7
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: low
LOW 2,6
Access Vector: network
Access Complexity: high
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial

Description

AI Translation Available

A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.

192

Integer Coercion Error

Incomplete
Common Consequences
Security Scopes Affected:
Availability Integrity Confidentiality Other
Potential Impacts:
Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Dos: Crash, Exit, Or Restart Execute Unauthorized Code Or Commands Other
Applicable Platforms
Languages: C, C#, C++, Java
View CWE Details
https://github.com/bettercap/bettercap/
https://github.com/bettercap/bettercap/commit/3731d5576cffae9eefe3721cd46a40933…
https://github.com/bettercap/bettercap/issues/1263
https://github.com/bettercap/bettercap/pull/1264
https://github.com/user-attachments/files/26852847/poc.py
https://vuldb.com/submit/811145
https://vuldb.com/vuln/362572
https://vuldb.com/vuln/362572/cti