Heat score
1Topic analysis
New Nginx Exploit
RCE Proof of concept for CVE-2026-42945 , a critical heap buffer overflow in NGINX's ngx_http_rewrite_module introduced in 2008. The bug enables unauthenticated remote code execution against servers using rewrite and set directives. This vulnerability — along with three other memory corruption issues (CVE-2026-42946, CVE-2026-40701, CVE-2026-42934) — was autonomously discovered by depthfirst 's security analysis system after a single click of onboarding the NGINX source. Want to find issues like this in your own code? Try the same system at https://depthfirst.com/open-defense . NGINX's script engine uses a two-pass process: first compute the required buffer size, then copy data in. The is_args flag is set on the main engine when a rewrite replacement contains ? , but the length-calculation pass runs on a freshly zeroed sub-engine. So: The copy overflows the undersized heap buffer with attacker-controlled URI data. Exploitation uses cross-request heap feng shui to corrupt an adjacent ngx_pool_t 's cleanup pointer (sprayed via POST bodies, since URI bytes can't contain null bytes), redirecting it to a fake ngx_pool_cleanup_s invoking system() on pool destruction. Read more about this bug in our technical write-up . Full vendor advisory: https://my.f5.com/manage/s/article/K000160932 Tested on Ubuntu 24.04.3 LTS.
Sources
1Platforms
1Relations
0- First seen
- May 15, 2026, 1:17 AM
- Last updated
- May 15, 2026, 4:02 AM
Why this topic matters
New Nginx Exploit is currently shaped by signals from 1 source platforms. This page organizes AI analysis summaries, 1 timeline events, and 0 relationship edges so search engines and AI systems can understand the topic's factual basis and propagation arc.
Keywords
10 tagsSource evidence
1 evidence itemsNew Nginx Exploit
News · 1Timeline
New Nginx Exploit
May 15, 2026, 1:17 AM
Related topics
No related topics have been aggregated yet, but this page still preserves the AI summary, source links, and timeline.