{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-39880","assignerOrgId":"a0819718-46f1-4df5-94e2-005712e83aaa","state":"PUBLISHED","assignerShortName":"GitHub_M","dateReserved":"2026-04-07T20:32:03.010Z","datePublished":"2026-04-08T20:01:21.673Z","dateUpdated":"2026-04-10T20:48:07.233Z"},"containers":{"cna":{"title":"Remnawave Backend has a race condition in HWID device limit allows bypassing max devices","problemTypes":[{"descriptions":[{"cweId":"CWE-362","lang":"en","description":"CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')","type":"CWE"}]}],"metrics":[{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":5,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:L/A:N","version":"3.1"}}],"references":[{"name":"https://github.com/remnawave/backend/security/advisories/GHSA-985p-44h5-v3pq","tags":["x_refsource_CONFIRM"],"url":"https://github.com/remnawave/backend/security/advisories/GHSA-985p-44h5-v3pq"}],"affected":[{"vendor":"remnawave","product":"backend","versions":[{"version":"< 2.7.5","status":"affected"}]}],"providerMetadata":{"orgId":"a0819718-46f1-4df5-94e2-005712e83aaa","shortName":"GitHub_M","dateUpdated":"2026-04-08T20:01:21.673Z"},"descriptions":[{"lang":"en","value":"Remnawave Backend is the backend for the Remnawave proxy and user management solution. Prior to 2.7.5, a glitch in the HWID device registration logic allows an authenticated user to bypass the configured limit for HWID devices and register more devices than expected, allowing them to resell subscriptions and consume excessive traffic. This vulnerability is fixed in 2.7.5."}],"source":{"advisory":"GHSA-985p-44h5-v3pq","discovery":"UNKNOWN"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2026-04-10T20:47:30.302993Z","id":"CVE-2026-39880","options":[{"Exploitation":"poc"},{"Automatable":"no"},{"Technical Impact":"partial"}],"role":"CISA Coordinator","version":"2.0.3"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-04-10T20:48:07.233Z"}}]}}