← back

CVE-2026-7674

HIGH · 8.8
hype MIXED · 42 hack

Real vuln, HIGH CVSS, but exploitation claim unverified; feeds dominate chatter.

What: Remote buffer overflow in Shenzhen Libituo LBT-T300-HW1 Web Management Interface (versions ≤1.2.8) via VPN argument manipulation; CVSS 8.8 (HIGH).

Why it matters: Published same day with no patch available; vendor unresponsive to disclosure. Post #3 claims active exploitation, but lacks corroborating PoC, scanning data, or defender triage reports. Not KEV-listed. Most posts are feed/alert aggregation; no security researcher validation yet.

Where it's seen: Vulnerability feed chatter, alert automation, one unsubstantiated claim of "being exploited now" on X. No vendor advisory, no public PoC, no defender questions in forums.

RISK: ELEVATED — Unpatched remote code execution, but narrow device scope; vendor unresponsive.

Generated by claude-haiku-4-5 from public posts and authoritative metadata. AI can make mistakes — verify against vendor advisories before acting. 5/3/2026, 8:15:39 AM

A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server can lead to buffer overflow. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.

Public PoCs on GitHub 3 repos

Articles & coverage 14 articles

  • CVE-2026-7674 - Exploits & Severity - Feedly

    # CVE-2026-7674 Published: May 2, 2026. No CVSS yetNo EPSS yet. CVE info copied to clipboard. The CVE description is not yet available but Feedly AI found some discussions about it. #### News. CVE-2026-7674 | Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8 Web Management Interface start\_single\_service vpn\_pptp\_server/vpn\_l2tp\_server buffer overflow. A vulnerability was found in Shenzhen

  • RHEL 8 : rhc (RHSA-2026:7674)<!-- --> | Tenable®

    # RHEL 8 : rhc (RHSA-2026:7674). ###### high Nessus Plugin ID 306065. The remote Red Hat host is missing a security update for rhc. The remote Redhat Enterprise Linux 8 host has a package installed that is affected by a vulnerability as referenced in the RHSA-2026:7674 advisory. rhc is a client tool and daemon that connects the system to Red Hat hosted services enabling system and subscription man

  • NVD - CVE-2026-26747

    Change History 3 change records found show changes **Initial Analysis by NIST 2/25/2026 9:42:23 PM** | Action | Type | Old Value | New Value | | --- | --- | --- | --- | | Added | CPE Configuration | | ``` OR *cpe:2.3:a:monicahq:monica:4.1.2:*:*:*:*:*:*:* ``` | | Added | Reference Type | | ``` MITRE: https://github.com/hungnqdz/cve-research/blob/main/CVE-2026-26747.md Types: Exploit,

  • Apache Tomcat: Moderate: Cache Poisoning (CVE-2017-7674)

    The response varies depending on Origin. This permitted client and server side cache poisoning in some circumstances.

  • CVE-2026-7334 Chrome Views Use-After-Free: Windows Admin Patch Lessons | Windows Forum

    **Note:** This feature may not be available in some browsers. # CVE-2026-7334 Chrome Views Use-After-Free: Windows Admin Patch Lessons. : chrome security updates chromium patch management cve 2026 7334 endpoint security. Google and Microsoft catalogued CVE-2026-7334 on April 28, 2026, as a high-severity use-after-free flaw in Chrome’s Views component on macOS, fixed in Chrome 147.0.7727.13

Page 1 of 3
NVD details 2 CWE ·0 vendors · 5 refs expand

Description

A flaw has been found in Shenzhen Libituo Technology LBT-T300-HW1 up to 1.2.8. This issue affects the function start_single_service of the component Web Management Interface. Executing a manipulation of the argument vpn_pptp_server/vpn_l2tp_server can lead to buffer overflow. The attack can be executed remotely. The vendor was contacted early about this disclosure but did not respond in any way.

Weaknesses

References

Top posts driving the trend