CVE-2026-3390

3.3 LOW

📋 TL;DR

This vulnerability allows local attackers to perform out-of-bounds read operations in FascinatedBox lily's error reporting component. The flaw could potentially leak sensitive memory contents or cause application crashes. Only users running lily versions up to 2.3 are affected.

💻 Affected Systems

Products:
  • FascinatedBox lily
Versions: Up to version 2.3
Operating Systems: All platforms running lily
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of affected versions are vulnerable by default

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Information disclosure of sensitive memory contents, potential application crash leading to denial of service, or as a stepping stone for further exploitation

🟠

Likely Case

Application crash or instability when processing malformed input in error reporting scenarios

🟢

If Mitigated

Limited impact due to local-only exploitation requirement and low CVSS score

🌐 Internet-Facing: LOW - Attack requires local access to the system
🏢 Internal Only: MEDIUM - Local users could exploit this to crash applications or potentially leak information

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploit requires local access and specific triggering conditions in error reporting

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Unknown

Vendor Advisory: None available

Restart Required: Yes

Instructions:

No official patch available. Monitor the GitHub repository for updates. Consider workarounds or alternative software if critical.

🔧 Temporary Workarounds

Disable or restrict lily usage

all

Remove or restrict execution of lily applications to trusted users only

chmod 750 /path/to/lily
chown root:root /path/to/lily

Implement strict input validation

all

Ensure all input to lily applications is properly validated before processing

🧯 If You Can't Patch

  • Implement strict access controls to limit who can execute lily applications
  • Monitor systems for abnormal application crashes or memory access patterns

🔍 How to Verify

Check if Vulnerable:

Check lily version with 'lily --version' or examine installed package version

Check Version:

lily --version

Verify Fix Applied:

Verify version is above 2.3 or check for updated package from vendor

📡 Detection & Monitoring

Log Indicators:

  • Application crashes of lily processes
  • Memory access violation errors in system logs

Network Indicators:

  • None - local-only vulnerability

SIEM Query:

Process:lily AND (EventID:1000 OR EventID:1001 OR "segmentation fault" OR "access violation")

🔗 References

📤 Share & Export