7.6
HIGH CVSS 3.1
CVE-2026-21381
Buffer Over-read in WLAN Firmware
Description

Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection.

INFO

Published Date :

April 6, 2026, 4:16 p.m.

Last Modified :

April 8, 2026, 8:58 p.m.

Remotely Exploit :

Yes !
Affected Products

The following products are affected by CVE-2026-21381 vulnerability. Even if cvefeed.io is aware of the exact versions of the products that are affected, the information is not represented in the table below.

ID Vendor Product Action
1 Qualcomm qca6391_firmware
2 Qualcomm wcd9380_firmware
3 Qualcomm wcd9385_firmware
4 Qualcomm wcn3988_firmware
5 Qualcomm wsa8810_firmware
6 Qualcomm wsa8815_firmware
7 Qualcomm wsa8830_firmware
8 Qualcomm wsa8835_firmware
9 Qualcomm ar8035_firmware
10 Qualcomm qca8081_firmware
11 Qualcomm qca8337_firmware
12 Qualcomm qcn9011_firmware
13 Qualcomm qcn9012_firmware
14 Qualcomm sxr2230p_firmware
15 Qualcomm wcd9340_firmware
16 Qualcomm wcd9370_firmware
17 Qualcomm wcd9375_firmware
18 Qualcomm wsa8832_firmware
19 Qualcomm fastconnect_6200_firmware
20 Qualcomm fastconnect_6900_firmware
21 Qualcomm fastconnect_7800_firmware
22 Qualcomm fastconnect_6700_firmware
23 Qualcomm qca6797aq_firmware
24 Qualcomm qcs8550_firmware
25 Qualcomm qcc710_firmware
26 Qualcomm qcc2073_firmware
27 Qualcomm qcc2076_firmware
28 Qualcomm wcd9390_firmware
29 Qualcomm wcd9395_firmware
30 Qualcomm wsa8840_firmware
31 Qualcomm wsa8845_firmware
32 Qualcomm wsa8845h_firmware
33 Qualcomm qcn6224_firmware
34 Qualcomm qcn6274_firmware
35 Qualcomm qfw7114_firmware
36 Qualcomm qfw7124_firmware
37 Qualcomm snapdragon_x75_5g_modem-rf_system_firmware
38 Qualcomm ar8035
39 Qualcomm qca6391
40 Qualcomm wcd9340
41 Qualcomm wcd9370
42 Qualcomm wcd9375
43 Qualcomm wcd9380
44 Qualcomm wcd9385
45 Qualcomm wcn3988
46 Qualcomm wsa8810
47 Qualcomm wsa8815
48 Qualcomm wsa8830
49 Qualcomm wsa8835
50 Qualcomm qca8337
51 Qualcomm qca8081
52 Qualcomm qcn9012
53 Qualcomm sc8380xp_firmware
54 Qualcomm snapdragon_8_gen_3_mobile_platform_firmware
55 Qualcomm fastconnect_6700
56 Qualcomm fastconnect_6200
57 Qualcomm fastconnect_6900
58 Qualcomm fastconnect_7800
59 Qualcomm qcc710
60 Qualcomm qcn6224
61 Qualcomm qcn6274
62 Qualcomm qfw7114
63 Qualcomm qfw7124
64 Qualcomm snapdragon_x75_5g_modem-rf_system
65 Qualcomm qca6797aq
66 Qualcomm qcn9011
67 Qualcomm qcs8550
68 Qualcomm sc8380xp
69 Qualcomm sxr2230p
70 Qualcomm wcd9390
71 Qualcomm wcd9395
72 Qualcomm wsa8832
73 Qualcomm wsa8840
74 Qualcomm wsa8845
75 Qualcomm wsa8845h
76 Qualcomm qcc2073
77 Qualcomm qcc2076
78 Qualcomm snapdragon_8_gen_3_mobile_platform
79 Qualcomm snapdragon_x72_5g_modem-rf_system_firmware
80 Qualcomm snapdragon_x72_5g_modem-rf_system
81 Qualcomm sxr2250p_firmware
82 Qualcomm sxr2250p
83 Qualcomm sm7435_firmware
84 Qualcomm sm7435
85 Qualcomm sm8635_firmware
86 Qualcomm sm8635
87 Qualcomm wcn6755_firmware
88 Qualcomm wcn6755
89 Qualcomm qca6777aq_firmware
90 Qualcomm qca6777aq
91 Qualcomm qca6787aq_firmware
92 Qualcomm qca6787aq
93 Qualcomm wcd9378_firmware
94 Qualcomm wcd9378
95 Qualcomm wcn7880_firmware
96 Qualcomm wcn7880
97 Qualcomm snapdragon_6_gen_1_mobile_platform_firmware
98 Qualcomm snapdragon_6_gen_1_mobile_platform
99 Qualcomm wcn6650_firmware
100 Qualcomm wcn6650
101 Qualcomm wcn7881_firmware
102 Qualcomm wcn7881
103 Qualcomm wcn7861_firmware
104 Qualcomm wcn7861
105 Qualcomm wcn7860_firmware
106 Qualcomm wcn7860
107 Qualcomm sm8750p_firmware
108 Qualcomm sm8750p
109 Qualcomm sm7675_firmware
110 Qualcomm sm7675
111 Qualcomm sm7675p_firmware
112 Qualcomm sm7675p
113 Qualcomm sm8635p_firmware
114 Qualcomm sm8635p
115 Qualcomm sxr2330p_firmware
116 Qualcomm sxr2330p
117 Qualcomm wcn6450_firmware
118 Qualcomm wcn6450
119 Qualcomm sm8650q_firmware
120 Qualcomm sm8650q
121 Qualcomm qmp1000_firmware
122 Qualcomm qmp1000
123 Qualcomm sm6650p_firmware
124 Qualcomm sm6650p
125 Qualcomm sm7635p_firmware
126 Qualcomm sm7635p
127 Qualcomm snapdragon_ar1_gen_1_platform_firmware
128 Qualcomm snapdragon_ar1_gen_1_platform
129 Qualcomm qca6698au_firmware
130 Qualcomm qca6698au
131 Qualcomm wcd9378c_firmware
132 Qualcomm wcd9378c
133 Qualcomm x2000077_firmware
134 Qualcomm x2000077
135 Qualcomm x2000086_firmware
136 Qualcomm x2000086
137 Qualcomm x2000090_firmware
138 Qualcomm x2000090
139 Qualcomm x2000092_firmware
140 Qualcomm x2000092
141 Qualcomm x2000094_firmware
142 Qualcomm x2000094
143 Qualcomm xg101002_firmware
144 Qualcomm xg101002
145 Qualcomm xg101032_firmware
146 Qualcomm xg101032
147 Qualcomm xg101039_firmware
148 Qualcomm xg101039
149 Qualcomm sxr2350p_firmware
150 Qualcomm sxr2350p
151 Qualcomm cologne_firmware
152 Qualcomm cologne
153 Qualcomm g2_gen_1_firmware
154 Qualcomm g2_gen_1
155 Qualcomm milos_firmware
156 Qualcomm milos
157 Qualcomm netrani_firmware
158 Qualcomm netrani
159 Qualcomm orne_firmware
160 Qualcomm orne
161 Qualcomm palawan25_firmware
162 Qualcomm palawan25
163 Qualcomm sar2130p_firmware
164 Qualcomm sar2130p
165 Qualcomm snapdragon_8_elite_firmware
166 Qualcomm snapdragon_8_elite
167 Qualcomm fwa_gen_3_ultra_firmware
168 Qualcomm fwa_gen_3_ultra
169 Qualcomm pandeiro_firmware
170 Qualcomm pandeiro
171 Qualcomm qln1083bd_firmware
172 Qualcomm qln1083bd
173 Qualcomm qln1086bd_firmware
174 Qualcomm qln1086bd
175 Qualcomm qpa1083bd_firmware
176 Qualcomm qpa1083bd
177 Qualcomm qpa1086bd_firmware
178 Qualcomm qpa1086bd
179 Qualcomm qxm1083_firmware
180 Qualcomm qxm1083
181 Qualcomm qxm1086_firmware
182 Qualcomm qxm1086
183 Qualcomm qxm1093_firmware
184 Qualcomm qxm1093
185 Qualcomm qxm1094_firmware
186 Qualcomm qxm1094
187 Qualcomm qxm1095_firmware
188 Qualcomm qxm1095
189 Qualcomm qxm1096_firmware
190 Qualcomm qxm1096
191 Qualcomm sar1165p_firmware
192 Qualcomm sar1165p
193 Qualcomm snapdragon_6_gen_3_mobile_platform_firmware
194 Qualcomm snapdragon_6_gen_3_mobile_platform
195 Qualcomm snapdragon_6_gen_4_mobile_platform_firmware
196 Qualcomm snapdragon_6_gen_4_mobile_platform
197 Qualcomm snapdragon_7s_gen_3_mobile_platform_firmware
198 Qualcomm snapdragon_7s_gen_3_mobile_platform
199 Qualcomm snapdragon_8_elite_gen_5_firmware
200 Qualcomm snapdragon_8_elite_gen_5
201 Qualcomm snapdragon_ar1\+_gen_1_platform_firmware
202 Qualcomm snapdragon_ar1\+_gen_1_platform
203 Qualcomm xrv7209_firmware
204 Qualcomm xrv7209
205 Qualcomm xrv9209_firmware
206 Qualcomm xrv9209
CVSS Scores
The Common Vulnerability Scoring System is a standardized framework for assessing the severity of vulnerabilities in software and systems. We collect and displays CVSS scores from various sources for each CVE.
Score Version Severity Vector Exploitability Score Impact Score Source
CVSS 3.1 HIGH 2cfc7d3e-20d3-47ac-8db7-1b7285aff15f
CVSS 3.1 HIGH [email protected]
CVSS 3.1 HIGH [email protected]
Solution
Limit the length of service data frames to prevent DoS during device matching.
  • Validate received service data frame lengths.
  • Drop excessively long frames.
  • Implement rate limiting for frame reception.
  • Update network protocol implementation.
References to Advisories, Solutions, and Tools

Here, you will find a curated list of external links that provide in-depth information, practical solutions, and valuable tools related to CVE-2026-21381.

URL Resource
https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html Vendor Advisory
CWE - Common Weakness Enumeration

While CVE identifies specific instances of vulnerabilities, CWE categorizes the common flaws or weaknesses that can lead to vulnerabilities. CVE-2026-21381 is associated with the following CWEs:

Common Attack Pattern Enumeration and Classification (CAPEC)

Common Attack Pattern Enumeration and Classification (CAPEC) stores attack patterns, which are descriptions of the common attributes and approaches employed by adversaries to exploit the CVE-2026-21381 weaknesses.

We scan GitHub repositories to detect new proof-of-concept exploits. Following list is a collection of public exploits and proof-of-concepts, which have been published on GitHub (sorted by the most recently updated).

Results are limited to the first 15 repositories due to potential performance issues.

The following list is the news that have been mention CVE-2026-21381 vulnerability anywhere in the article.

The following table lists the changes that have been made to the CVE-2026-21381 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution of a vulnerability, and for identifying the most recent changes that may impact the vulnerability's severity, exploitability, or other characteristics.

  • Initial Analysis by [email protected]

    Apr. 08, 2026

    Action Type Old Value New Value
    Added CVSS V3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:ar8035_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:ar8035:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:cologne_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:cologne:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6200_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6200:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6700_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6700:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_6900_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_6900:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fastconnect_7800_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fastconnect_7800:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:fwa_gen_3_ultra_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:fwa_gen_3_ultra:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:g2_gen_1_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:g2_gen_1:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:milos_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:milos:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:netrani_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:netrani:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:orne_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:orne:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:palawan25_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:palawan25:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:pandeiro_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:pandeiro:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6391_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6391:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6698au_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6698au:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6777aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6777aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6787aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6787aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca6797aq_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca6797aq:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8081_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8081:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qca8337_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qca8337:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc2073_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc2073:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc2076_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc2076:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcc710_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcc710:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6224_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6224:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn6274_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn6274:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9011_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9011:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcn9012_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcn9012:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qcs8550_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qcs8550:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7114_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7114:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qfw7124_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qfw7124:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qln1083bd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qln1083bd:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qln1086bd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qln1086bd:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qmp1000_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qmp1000:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qpa1083bd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qpa1083bd:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qpa1086bd_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qpa1086bd:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1083_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1083:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1086_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1086:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1093_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1093:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1094_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1094:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1095_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1095:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:qxm1096_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:qxm1096:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sar1165p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sar1165p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sar2130p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sar2130p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sc8380xp_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sc8380xp:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm6650p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm6650p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7435_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7435:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7635p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7635p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7675_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7675:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm7675p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm7675p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8635_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8635:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8635p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8635p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8650q_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8650q:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sm8750p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sm8750p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_6_gen_1_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_6_gen_1_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_6_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_6_gen_3_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_6_gen_4_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_6_gen_4_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_7s_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_7s_gen_3_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_elite_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_elite:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_elite_gen_5_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_elite_gen_5:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_8_gen_3_mobile_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_8_gen_3_mobile_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_ar1_gen_1_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_ar1_gen_1_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_ar1+_gen_1_platform_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_ar1+_gen_1_platform:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x72_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x72_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:snapdragon_x75_5g_modem-rf_system_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:snapdragon_x75_5g_modem-rf_system:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2230p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2230p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2250p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2250p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2330p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2330p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:sxr2350p_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:sxr2350p:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9340_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9340:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9370_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9370:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9375_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9375:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9378_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9378:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9378c_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9378c:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9380_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9380:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9385_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9385:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9390_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9390:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcd9395_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcd9395:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn3988_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn3988:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6450_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6450:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6650_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6650:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn6755_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn6755:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7860_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7860:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7861_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7861:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7880_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7880:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wcn7881_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wcn7881:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8810_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8810:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8815_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8815:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8830_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8830:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8832_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8832:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8835_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8835:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8840_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8840:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:wsa8845h_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:wsa8845h:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:x2000077_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:x2000077:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:x2000086_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:x2000086:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:x2000090_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:x2000090:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:x2000092_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:x2000092:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:x2000094_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:x2000094:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:xg101002_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:xg101002:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:xg101032_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:xg101032:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:xg101039_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:xg101039:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:xrv7209_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:xrv7209:-:*:*:*:*:*:*:*
    Added CPE Configuration AND OR *cpe:2.3:o:qualcomm:xrv9209_firmware:-:*:*:*:*:*:*:* OR cpe:2.3:h:qualcomm:xrv9209:-:*:*:*:*:*:*:*
    Added Reference Type Qualcomm, Inc.: https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html Types: Vendor Advisory
  • New CVE Received by [email protected]

    Apr. 06, 2026

    Action Type Old Value New Value
    Added Description Transient DOS when receiving a service data frame with excessive length during device matching over a neighborhood awareness network protocol connection.
    Added CVSS V3.1 AV:N/AC:H/PR:H/UI:R/S:C/C:H/I:H/A:H
    Added CWE CWE-126
    Added Reference https://docs.qualcomm.com/product/publicresources/securitybulletin/april-2026-bulletin.html
EPSS is a daily estimate of the probability of exploitation activity being observed over the next 30 days. Following chart shows the EPSS score history of the vulnerability.