Armis Logo< Back

CVE-2026-37541:

A critical buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) version 3.3.005 allows remote attackers to cause denial of service or execute arbitrary code via crafted GVRET frames due to improper validation of the length field in GVRET binary data within `canformat_gvret.cpp`.


Score
Info
A numerical rating that indicates how dangerous this vulnerability is.

10.0Critical
  • Published Date:May 1, 2026
  • CISA KEV Date:*No Data*
  • Industries Affected:20

Exploitability

  • Score:3.9
  • Attack Vector:NETWORK
  • Attack Complexity:LOW
  • Privileges Required:NONE
  • User Interaction:NONE
  • Scope:CHANGED

Impact

  • Score:6.0
  • Confidentiality Impact:HIGH
  • Integrity Impact:HIGH
  • Availability Impact:HIGH

Description Preview

A critical buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) version 3.3.005 allows remote attackers to cause denial of service or execute arbitrary code via crafted GVRET frames due to improper validation of the length field in GVRET binary data within `canformat_gvret.cpp`.

Overview

CVE-2026-37541 is a critical stack-based buffer overflow vulnerability in Open Vehicle Monitoring System 3 (OVMS3) version 3.3.005. The flaw resides in `canformat_gvret.cpp`, where the length field in GVRET binary protocol data is not properly validated. Remote unauthenticated attackers can send maliciously crafted GVRET frames to trigger memory corruption, leading to denial of service or arbitrary code execution. The CVSS v3.1 score of 10.0 underscores the severity of the vulnerability, given the network accessibility, absence of required privileges or user interaction, and the potential for complete system compromise across a changed scope.

Remediation

  • Users and administrators running OVMS3 version 3.3.005 should take the following steps to remediate or mitigate this vulnerability. First, monitor the official Open Vehicle Monitoring System 3 GitHub repository for patches or updated releases that address this vulnerability and apply them immediately upon availability. Second, restrict network access to OVMS3 interfaces using firewall rules or network segmentation to limit exposure to untrusted networks or hosts. Third, review and apply any available input validation patches or workarounds in `canformat_gvret.cpp` that enforce strict bounds checking on the GVRET binary data length field. Fourth, monitor systems for anomalous behavior or unexpected crashes that may indicate exploitation attempts. Fifth, consider disabling GVRET binary frame processing if it is not required for operational use until a fix is confirmed and deployed.

References

Industries Affected

Below is a list of industries most commonly impacted or potentially at risk based on intelligence.

Low
Mining icon
Mining
Utilities icon
Utilities
Information icon
Information
Construction icon
Construction
Retail Trade icon
Retail Trade
Manufacturing icon
Manufacturing
Wholesale Trade icon
Wholesale Trade
Educational Services icon
Educational Services
Finance and Insurance icon
Finance and Insurance
Public Administration icon
Public Administration
Real Estate Rental and Leasing icon
Real Estate Rental and Leasing
Transportation and Warehousing icon
Transportation and Warehousing
Accommodation and Food Services icon
Accommodation and Food Services
Health Care and Social Assistance icon
Health Care and Social Assistance
Arts, Entertainment, and Recreation icon
Arts, Entertainment, and Recreation
Management of Companies and Enterprises icon
Management of Companies and Enterprises
Agriculture, Forestry, Fishing and Hunting icon
Agriculture, Forestry, Fishing and Hunting
Other Services (except Public Administration) icon
Other Services (except Public Administration)
Professional, Scientific, and Technical Services icon
Professional, Scientific, and Technical Services
Administrative and Support and Waste Management and Remediation Services icon
Administrative and Support and Waste Management and Remediation Services

Focus on What Matters

See everything.Identify true risk.Proactively mitigate threats.Book a Demo

Let's talk!