Echo Mate

2 CVEs product

Monthly

CVE-2026-4737 HIGH PATCH This Week

A Use After Free vulnerability exists in the No-Chicken Echo-Mate SDK, specifically within the kernel memory management modules (rmap.C file), that can lead to denial of service and memory corruption. This vulnerability affects Echo-Mate versions prior to V250329 and has been reported by GovTech CSG. An attacker exploiting this flaw could trigger a crash or potentially achieve code execution through memory corruption, though the specific attack vector complexity remains dependent on the exposure of the affected kernel module.

Use After Free Denial Of Service Linux Kernel Echo Mate
NVD GitHub VulDB
CVSS 4.0
7.3
EPSS
0.0%
CVE-2026-4736 HIGH PATCH This Week

Improper handling of values in the netfilter modules of Echo-Mate SDK versions before V250329 allows local attackers with low privileges to achieve high-impact confidentiality, integrity, and availability violations through manipulation of nf_tables, nft_byteorder, or nft_meta components. The vulnerability requires local access and specific conditions to exploit but poses significant risk to system security with confirmed patch availability.

Linux Linux Kernel Echo Mate
NVD GitHub VulDB
CVSS 4.0
7.3
EPSS
0.0%
CVE-2026-4737
EPSS 0% CVSS 7.3
HIGH PATCH This Week

A Use After Free vulnerability exists in the No-Chicken Echo-Mate SDK, specifically within the kernel memory management modules (rmap.C file), that can lead to denial of service and memory corruption. This vulnerability affects Echo-Mate versions prior to V250329 and has been reported by GovTech CSG. An attacker exploiting this flaw could trigger a crash or potentially achieve code execution through memory corruption, though the specific attack vector complexity remains dependent on the exposure of the affected kernel module.

Use After Free Denial Of Service Linux Kernel +1
NVD GitHub VulDB
CVE-2026-4736
EPSS 0% CVSS 7.3
HIGH PATCH This Week

Improper handling of values in the netfilter modules of Echo-Mate SDK versions before V250329 allows local attackers with low privileges to achieve high-impact confidentiality, integrity, and availability violations through manipulation of nf_tables, nft_byteorder, or nft_meta components. The vulnerability requires local access and specific conditions to exploit but poses significant risk to system security with confirmed patch availability.

Linux Linux Kernel Echo Mate
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy