Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1110 CNY

100%

CVE-2026-7835— Format string argument mismatch

CVSS 3.1 · Low EPSS 0.10% · P28

Possible ATT&CK Techniques 1AI

T1190 · Exploit Public-Facing Application

Affected Version Matrix 2

VendorProductVersion RangeStatus
NetatalkNetatalk3.0.3≤ 4.4.2affected
4.5.0unaffected
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-7835

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Format string argument mismatch
Source: NVD (National Vulnerability Database)
Vulnerability Description
A format string argument mismatch in Netatalk 3.0.3 through 4.4.2 allows a remote authenticated attacker to cause a minor denial of service via crafted input that triggers incorrect format string processing.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:L
Source: NVD (National Vulnerability Database)
Vulnerability Type
使用外部控制的格式字符串
Source: NVD (National Vulnerability Database)
Vulnerability Title
Netatalk 格式化字符串错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Netatalk是Netatalk开源的一款软件,为 Classic Mac OS 和 macOS 在 Unix-like OS 上提供 AFP 文件服务器功能。 Netatalk 3.0.3版本至4.4.2版本存在格式化字符串错误漏洞,该漏洞源于格式字符串参数不匹配,可能导致远程经过身份验证的攻击者造成拒绝服务。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
NetatalkNetatalk 3.0.3 ~ 4.4.2 -

II. Public POCs for CVE-2026-7835

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-7835

登录查看更多情报信息。

Vendor Advisories for CVE-2026-7835 (1)

Same Patch Batch · Netatalk · 2026-05-21 · 33 CVEs total

CVE-2026-440509.9 CRITICALHeap buffer overflow in CNID daemon comm_rcv()
CVE-2026-440478.8 HIGHSQL injection in MySQL CNID backend
CVE-2026-440488.8 HIGHStack buffer overflow via UCS-2 type confusion in convert_charset()
CVE-2026-440518.1 HIGHArbitrary file read via attacker-controlled symlink creation
CVE-2026-440687.6 HIGHEA path traversal via incomplete sanitization
CVE-2026-440497.5 HIGHOut-of-bounds write in convert_charset() null termination
CVE-2026-440557.5 HIGHBitwise OR logic bug enables shell injection
CVE-2026-440527.5 HIGHLDAP simple-bind password exposure in log output
CVE-2026-440607.5 HIGHInteger underflow in dsi_writeinit() leads to denial of service
CVE-2026-440627.5 HIGHMissing o_len bounds check in pull_charset_flags()
CVE-2026-440537.4 HIGHWeak cryptography in DHCAST128 UAM
CVE-2026-440647.1 HIGHASP session ID out-of-bounds access
CVE-2026-440667.1 HIGHHeap out-of-bounds reads in Spotlight RPC unmarshalling
CVE-2026-440766.7 MEDIUMShell injection via volume path
CVE-2026-440546.5 MEDIUMPredictable afpd session token
CVE-2026-440586.4 MEDIUMAuthentication bypass via admin auth user
CVE-2026-440566.0 MEDIUMStack buffer overflow in desktop.c
CVE-2026-440615.9 MEDIUMDES-ECB auth with timing side channel
CVE-2026-440634.2 MEDIUMLDAP filter injection
CVE-2026-440734.0 MEDIUMseteuid failure ignored in auth modules

Showing top 20 of 33 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2026-7835

No comments yet


Leave a comment