CVE-2026-8275
Published: Mon, 11 May 2026 06:16
Summary
A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod
Details
A vulnerability was detected in bettercap up to 2.41.5. Affected by this vulnerability is the function ippReadChunkedBody of the file modules/zerogod/zerogod_ipp_primitives.go of the component zerogod IPP Service. Performing a manipulation results in integer coercion error. The attack can be initiated remotely. The attack is considered to have high complexity. The exploitation appears to be difficult. The exploit is now public and may be used. The patch is named 3731d5576cffae9eefe3721cd46a40933304129f. To fix this issue, it is recommended to deploy a patch.
Are YOU affected by CVE-2026-8275?
5-second check on your actual server. Reads /etc/os-release, uname -r, and dpkg-query; matches against the live USN + Debian Security Tracker feeds; tells you whether CVE-2026-8275 (and any other live CVE) applies. Anonymous, no signup.
curl https://mindsparkstack.com/scan.sh | bash
References
- https://github.com/bettercap/bettercap/
- https://github.com/bettercap/bettercap/commit/3731d5576cffae9eefe3721cd46a40933304129f
- https://github.com/bettercap/bettercap/issues/1263
- https://github.com/bettercap/bettercap/pull/1264
- https://github.com/user-attachments/files/26852847/poc.py
- https://vuldb.com/submit/811145
- https://vuldb.com/vuln/362572
- https://vuldb.com/vuln/362572/cti
StackPatch runs this match against YOUR installed packages every hour
Free 1-server / $99 lifetime founder seat (50 only) / $19+/mo monthly. Indie pricing.