Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| http://u-speed.com |
|
| https://github.com/kirubel-cve/CVE-2026-36958 |
|
Tue, 05 May 2026 03:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
U-speed n300
U-speed n300 Firmware |
|
| CPEs | cpe:2.3:h:u-speed:n300:-:*:*:*:*:*:*:* cpe:2.3:o:u-speed:n300_firmware:1.0.0:*:*:*:*:*:*:* |
|
| Vendors & Products |
U-speed n300
U-speed n300 Firmware |
Sat, 02 May 2026 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | Denial of Service via HTTP Flood on U‑SPEED N300 Router |
Fri, 01 May 2026 08:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
U-speed
U-speed n300 Router |
|
| Vendors & Products |
U-speed
U-speed n300 Router |
Thu, 30 Apr 2026 16:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-400 | |
| Metrics |
cvssV3_1
|
Thu, 30 Apr 2026 15:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A denial-of-service vulnerability exists in the U-SPEED N300 V1.0.0 wireless router. By sending a large number of concurrent HTTP requests to random or non-existent endpoints on the web management interface, an attacker can exhaust system resources in the embedded Boa HTTP server. This causes the router web interface to become unresponsive and may require manual reboot to restore normal operation. | |
| References |
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2026-04-30T15:37:28.828Z
Reserved: 2026-04-06T00:00:00.000Z
Link: CVE-2026-36958
Updated: 2026-04-30T15:35:47.324Z
Status : Analyzed
Published: 2026-04-30T15:16:22.963
Modified: 2026-05-05T03:00:49.310
Link: CVE-2026-36958
No data.
OpenCVE Enrichment
Updated: 2026-05-02T11:00:06Z