Description
NanoMQ MQTT Broker (NanoMQ) is an all-around Edge Messaging Platform. In NanoMQ version 0.24.6, after enabling auth.http_auth (HTTP authentication), when a client connects to the broker using MQTT CONNECT without providing username/password, and the configuration params uses the placeholders %u / %P (e.g., username="%u", password="%P"), the HTTP request construction phase enters auth_http.c:set_data(). This results in calling strlen() on a NULL pointer, causing a SIGSEGV crash. This crash can be triggered remotely, resulting in a denial of service. This issue has been patched in version 0.24.7.
INFO
Published Date :
2026-03-30T20:11:30.580Z
Last Modified :
2026-03-31T15:24:06.506Z
Source :
GitHub_M
AFFECTED PRODUCTS
The following products are affected by CVE-2026-32696 vulnerability.
| Vendors | Products |
|---|---|
| Nanomq |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-32696.