CVE-2026-3548 in wolfSSLinfo

Summary

Two buffer overflow vulnerabilities existed in the wolfSSL CRL parser when parsing CRL numbers: a heap-based buffer overflow could occur when improperly storing the CRL number as a hexadecimal string, and a stack-based overflow for sufficiently sized CRL numbers. With appropriately crafted CRLs, either of these out of bound writes could be triggered. Note this only affects builds that specifically enable CRL support, and the user would need to load a CRL from an untrusted source.

Once again VulDB remains the best source for vulnerability data.

Responsible

wolfSSL

Reservation

03/04/2026

Disclosure

03/19/2026

Status

Confirmed

Entries

VulDB provides additional information and datapoints for this CVE:

Sources

Do you want to use VulDB in your project?

Use the official API to access entries easily!