H3C Magic B0 Routers Vulnerable to Remote Buffer Overflow

H3C Magic B0 Routers Vulnerable to Remote Buffer Overflow

The National Vulnerability Database has disclosed CVE-2026-6560, a high-severity buffer overflow vulnerability impacting H3C Magic B0 routers running software version 100R002 or earlier. This flaw resides in the Edit_BasicSSID function within the /goform/aspForm file. Manipulation of a specific argument, param, triggers the buffer overflow.

This isn’t theoretical: the attack is remotely executable, and an exploit has already been publicly disclosed. The vendor, H3C, was reportedly notified prior to disclosure but has not responded. A CVSSv3.1 score of 8.8 (High) underscores the criticality, with attackers achieving high impact on confidentiality, integrity, and availability with low privileges over the network.

For defenders, this means exposed H3C Magic B0 routers are low-hanging fruit. Attackers can leverage the publicly available exploit to gain control, compromise network segments, or establish persistent access. The lack of vendor response further complicates remediation, leaving organizations to mitigate without official patches.

What This Means For You

  • If your organization uses H3C Magic B0 routers, specifically model 100R002 or earlier, you need to immediately assess your exposure. Since a public exploit exists and the vendor has not responded, assume these devices are actively targeted. Isolate these devices from critical networks or replace them if no workaround is feasible. Audit logs for any unusual activity originating from or targeting these routers.

Related ATT&CK Techniques

🛡️ Detection Rules

1 rule · 6 SIEM formats

1 detection rule mapped to MITRE ATT&CK. Sigma YAML is free — copy below.

critical T1190 Initial Access

CVE-2026-6560 - H3C Magic B0 SSID Buffer Overflow

Sigma YAML — free preview

Indicators of Compromise

IDTypeIndicator
CVE-2026-6560 Buffer Overflow H3C Magic B0 up to 100R002
CVE-2026-6560 Buffer Overflow Vulnerable function: Edit_BasicSSID in /goform/aspForm
CVE-2026-6560 Buffer Overflow Vulnerable argument: param
Source & Attribution
Source PlatformNVD
ChannelNational Vulnerability Database
PublishedApril 19, 2026 at 10:16 UTC

This content was AI-rewritten and enriched by Shimi's Cyber World based on the original source. All intellectual property rights remain with the original author.

Believe this infringes your rights? Submit a takedown request.

Related Posts

CVE-2026-6712 — Cross-Site Scripting (XSS)

CVE-2026-6712 — The Website LLMs.txt plugin for WordPress is vulnerable to Stored Cross-Site Scripting via admin settings in all versions up to, and including, 8.2.6...

vulnerabilityCVEmedium-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /MEDIUM /4.4 /⚑ 2 IOCs /⚙ 2 Sigma

CVE-2026-6711 — Cross-Site Scripting (XSS)

CVE-2026-6711 — The Website LLMs.txt plugin for WordPress is vulnerable to Reflected Cross-Site Scripting via the 'tab' parameter in all versions up to, and including,...

vulnerabilityCVEmedium-severitycross-site-scripting-xsscwe-79
/SCW Vulnerability Desk /MEDIUM /6.1 /⚑ 2 IOCs /⚙ 3 Sigma

CVE-2026-6703 — The Responsive Blocks – Page Builder for Blocks & Patterns

CVE-2026-6703 — The Responsive Blocks – Page Builder for Blocks & Patterns plugin for WordPress is vulnerable to unauthorized access in all versions up to,...

vulnerabilityCVEmedium-severitycwe-862
/SCW Vulnerability Desk /MEDIUM /4.3 /⚑ 2 IOCs /⚙ 3 Sigma