CVE-2026-43048 POC (Proof-of-Concept)

CVE-2026-43048 POC (Proof-of-Concept)

In the Linux kernel, the following vulnerability has been resolved:
HID: core: Mitigate potential OOB by removing bogus memset()
The memset() in hid_report_raw_event() has the good intention of
clearing out bogus data by zeroing the area from the end of the incoming
data string to the assumed end of the buffer. However, as we have
previously seen, doing so can easily result in OOB reads and writes in
the subsequent thread of execution.
The current suggestion from one of the HID maintainers is to remove the
memset() and simply return if the incoming event buffer size is not
large enough to fill the associated report.
Suggested-by Benjamin Tissoires
[bentiss: changed the return value]

Published: 2026-05-01

CVSS: 8.8

CVSS Vector: CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Download CVE-2026-43048 POC (Proof-of-Concept) here:

Tip: Download official Tor Browser at https://www.torproject.org/download/ to access .onion links.

https://hokyo.gr/poc-846-cve-2026-41491/

https://hokyo.gr/poc-446-cve-2026-1719/

https://hokyo.gr/poc-546-cve-2026-20035/

https://hokyo.gr/poc-737-cve-2026-7413/

Copyright 2017- 2025 Hokyo JapanEats ©