{"api_version":"1","generated_at":"2026-05-07T11:16:23+00:00","cve":"CVE-2026-40003","urls":{"html":"https://cve.report/CVE-2026-40003","api":"https://cve.report/api/cve/CVE-2026-40003.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-40003","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-40003"},"summary":{"title":"USB-based arbitrary memory write vulnerability in ZTE ZX297520V3 soc BootROM","description":"ZTE ZX297520V3 BootROM contains a vulnerability that allows arbitrary memory writes via USB. Attackers can exploit the lack of target address validation in the USB download mode to write data to any location in BootROM runtime memory, thereby overwriting the stack, hijacking the execution flow, bypassing the Secure Boot signature verification mechanism, and achieving unauthorized code execution.","state":"PUBLISHED","assigner":"zte","published_at":"2026-05-07 02:16:03","updated_at":"2026-05-07 02:16:03"},"problem_types":["CWE-787","CWE-787 CWE-787 Out-of-bounds write"],"metrics":[{"version":"3.1","source":"psirt@zte.com.cn","type":"Secondary","score":"5.1","severity":"MEDIUM","vector":"CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L","data":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"LOW"}},{"version":"3.1","source":"CNA","type":"CVSS","score":"5.1","severity":"MEDIUM","vector":"CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L","data":{"attackComplexity":"HIGH","attackVector":"PHYSICAL","availabilityImpact":"LOW","baseScore":5.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L","version":"3.1"}}],"references":[{"url":"https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/2144487415169560645","name":"https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/2144487415169560645","refsource":"psirt@zte.com.cn","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-40003","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-40003","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"ZTE","product":"ZX297520V3 BootROM","version":"affected 7520V3 chip","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[{"source":"CNA","value":"rva3","lang":"en"}],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"ZX297520V3 BootROM","vendor":"ZTE","versions":[{"status":"affected","version":"7520V3 chip"}]}],"credits":[{"lang":"en","type":"finder","value":"rva3"}],"descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"ZTE ZX297520V3 BootROM contains a vulnerability that allows arbitrary memory writes via USB. Attackers can exploit the lack of target address validation in the USB download mode to write data to any location in BootROM runtime memory, thereby overwriting the stack, hijacking the execution flow, bypassing the Secure Boot signature verification mechanism, and achieving unauthorized code execution."}],"value":"ZTE ZX297520V3 BootROM contains a vulnerability that allows arbitrary memory writes via USB. Attackers can exploit the lack of target address validation in the USB download mode to write data to any location in BootROM runtime memory, thereby overwriting the stack, hijacking the execution flow, bypassing the Secure Boot signature verification mechanism, and achieving unauthorized code execution."}],"impacts":[{"capecId":"CAPEC-124","descriptions":[{"lang":"en","value":"CAPEC-124 Shared Resource Manipulation"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"PHYSICAL","availabilityImpact":"LOW","baseScore":5.1,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L","version":"3.1"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-787","description":"CWE-787 Out-of-bounds write","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-05-07T01:15:24.863Z","orgId":"6786b568-6808-4982-b61f-398b0d9679eb","shortName":"zte"},"references":[{"url":"https://support.zte.com.cn/zte-iccp-isupport-webui/bulletin/detail/2144487415169560645"}],"source":{"discovery":"UNKNOWN"},"title":"USB-based arbitrary memory write vulnerability in ZTE ZX297520V3 soc BootROM","x_generator":{"engine":"Vulnogram 1.0.2"}}},"cveMetadata":{"assignerOrgId":"6786b568-6808-4982-b61f-398b0d9679eb","assignerShortName":"zte","cveId":"CVE-2026-40003","datePublished":"2026-05-07T01:15:24.863Z","dateReserved":"2026-04-08T07:51:26.675Z","dateUpdated":"2026-05-07T01:15:24.863Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-05-07 02:16:03","lastModifiedDate":"2026-05-07 02:16:03","problem_types":["CWE-787","CWE-787 CWE-787 Out-of-bounds write"],"metrics":{"cvssMetricV31":[{"source":"psirt@zte.com.cn","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:U/C:L/I:H/A:L","baseScore":5.1,"baseSeverity":"MEDIUM","attackVector":"PHYSICAL","attackComplexity":"HIGH","privilegesRequired":"NONE","userInteraction":"REQUIRED","scope":"UNCHANGED","confidentialityImpact":"LOW","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":0.4,"impactScore":4.7}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"40003","Ordinal":"1","Title":"USB-based arbitrary memory write vulnerability in ZTE ZX297520V3","CVE":"CVE-2026-40003","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"40003","Ordinal":"1","NoteData":"ZTE ZX297520V3 BootROM contains a vulnerability that allows arbitrary memory writes via USB. Attackers can exploit the lack of target address validation in the USB download mode to write data to any location in BootROM runtime memory, thereby overwriting the stack, hijacking the execution flow, bypassing the Secure Boot signature verification mechanism, and achieving unauthorized code execution.","Type":"Description","Title":"USB-based arbitrary memory write vulnerability in ZTE ZX297520V3"}]}}}