CVE-2026-8276

Published: Mag 11, 2026 Last Modified: Mag 11, 2026
ExploitDB:
Other exploit source:
Google Dorks:
LOW 2,9
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Confidentiality: N/A
Integrity: N/A
Availability: N/A
LOW 3,7
Attack Vector: network
Attack Complexity: high
Privileges Required: none
User Interaction: none
Scope: unchanged
Confidentiality: none
Integrity: none
Availability: low
LOW 2,6
Access Vector: network
Access Complexity: high
Authentication: none
Confidentiality: none
Integrity: none
Availability: partial

Description

AI Translation Available

A flaw has been found in bettercap up to 2.41.5. Affected by this issue is some unknown functionality of the file modules/mysql_server/mysql_server.go of the component MySQL Server. Executing a manipulation can lead to integer coercion error. The attack can be launched remotely. The attack requires a high level of complexity. The exploitation is known to be difficult. The exploit has been published and may be used. This patch is called 0eaa375c5e5446bfba94a290eff92967a5deac9e. It is advisable to implement a patch to correct this issue.

192

Integer Coercion Error

Incomplete
Common Consequences
Security Scopes Affected:
Availability Integrity Confidentiality Other
Potential Impacts:
Dos: Resource Consumption (Cpu) Dos: Resource Consumption (Memory) Dos: Crash, Exit, Or Restart Execute Unauthorized Code Or Commands Other
Applicable Platforms
Languages: C, C#, C++, Java
View CWE Details
https://github.com/bettercap/bettercap/
https://github.com/bettercap/bettercap/commit/0eaa375c5e5446bfba94a290eff92967a…
https://github.com/bettercap/bettercap/issues/1265
https://github.com/bettercap/bettercap/issues/1265#issue-4287957382
https://github.com/bettercap/bettercap/pull/1266
https://vuldb.com/submit/811163
https://vuldb.com/vuln/362573
https://vuldb.com/vuln/362573/cti