{"api_version":"1","generated_at":"2026-04-11T20:35:34+00:00","cve":"CVE-2026-4149","urls":{"html":"https://cve.report/CVE-2026-4149","api":"https://cve.report/api/cve/CVE-2026-4149.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2026-4149","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2026-4149"},"summary":{"title":"Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability","description":"Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos Era 300. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the DataOffset field within SMB responses. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the kernel. Was ZDI-CAN-28345.","state":"PUBLISHED","assigner":"zdi","published_at":"2026-04-11 01:16:16","updated_at":"2026-04-11 01:16:16"},"problem_types":["CWE-119","CWE-119 CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"],"metrics":[{"version":"3.0","source":"zdi-disclosures@trendmicro.com","type":"Secondary","score":"10","severity":"CRITICAL","vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","data":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"}},{"version":"3.0","source":"CNA","type":"CVSS","score":"10","severity":"CRITICAL","vector":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","data":{"baseScore":10,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.0"}}],"references":[{"url":"https://www.zerodayinitiative.com/advisories/ZDI-26-192/","name":"https://www.zerodayinitiative.com/advisories/ZDI-26-192/","refsource":"zdi-disclosures@trendmicro.com","tags":[],"title":"","mime":"","httpstatus":"","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2026-4149","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2026-4149","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"Sonos","product":"Era 300","version":"affected 17.5 (build 91.0-70070)","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"cna":{"affected":[{"defaultStatus":"unknown","product":"Era 300","vendor":"Sonos","versions":[{"status":"affected","version":"17.5 (build 91.0-70070)"}]}],"dateAssigned":"2026-03-13T20:27:19.177Z","datePublic":"2026-03-16T21:27:56.246Z","descriptions":[{"lang":"en","value":"Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos Era 300. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the DataOffset field within SMB responses. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the kernel. Was ZDI-CAN-28345."}],"metrics":[{"cvssV3_0":{"baseScore":10,"baseSeverity":"CRITICAL","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","version":"3.0"},"format":"CVSS"}],"problemTypes":[{"descriptions":[{"cweId":"CWE-119","description":"CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2026-04-11T00:12:33.497Z","orgId":"99f1926a-a320-47d8-bbb5-42feb611262e","shortName":"zdi"},"references":[{"name":"ZDI-26-192","tags":["x_research-advisory"],"url":"https://www.zerodayinitiative.com/advisories/ZDI-26-192/"}],"source":{"lang":"en","value":"dmdung (@_piers2) of STAR Labs SG Pte. Ltd"},"title":"Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability"}},"cveMetadata":{"assignerOrgId":"99f1926a-a320-47d8-bbb5-42feb611262e","assignerShortName":"zdi","cveId":"CVE-2026-4149","datePublished":"2026-04-11T00:12:33.497Z","dateReserved":"2026-03-13T20:27:19.120Z","dateUpdated":"2026-04-11T00:12:33.497Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.2"},"nvd":{"publishedDate":"2026-04-11 01:16:16","lastModifiedDate":"2026-04-11 01:16:16","problem_types":["CWE-119","CWE-119 CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer"],"metrics":{"cvssMetricV30":[{"source":"zdi-disclosures@trendmicro.com","type":"Secondary","cvssData":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H","baseScore":10,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":6}]},"configurations":[]},"legacy_mitre":{"record":{"CveYear":"2026","CveId":"4149","Ordinal":"1","Title":"Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Exec","CVE":"CVE-2026-4149","Year":"2026"},"notes":[{"CveYear":"2026","CveId":"4149","Ordinal":"1","NoteData":"Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Execution Vulnerability. This vulnerability allows remote attackers to execute arbitrary code on affected installations of Sonos Era 300. Authentication is not required to exploit this vulnerability.\n\nThe specific flaw exists within the handling of the DataOffset field within SMB responses. The issue results from the lack of proper validation of user-supplied data, which can result in a memory access past the end of an allocated buffer. An attacker can leverage this vulnerability to execute code in the context of the kernel. Was ZDI-CAN-28345.","Type":"Description","Title":"Sonos Era 300 SMB Response Out-Of-Bounds Access Remote Code Exec"}]}}}