Return of the Living Dead: How X-TRACK Resurrected a Critical zlib Bug
Vulnerability ID: CVE-2026-24823
CVSS Score: 10.0
Published: 2026-01-27
A critical heap buffer overflow in FASTSHIFT X-TRACK firmware caused by an unpatched fork of the zlib library. This vulnerability allows remote code execution via malformed GZIP headers, specifically through the 'extra field' handling logic.
TL;DR
FASTSHIFT's GPS bike computers are running a zombie version of zlib. They copied code vulnerable to CVE-2022-37434 (a 4-year-old bug), didn't patch it, and now have a CVSS 10.0 RCE on their hands. To make matters worse, the fix introduces a potential crash loop.
⚠️ Exploit Status: POC
Technical Details
- CVE ID: CVE-2026-24823
- CVSS v4.0: 10.0 (Critical)
- CWE: CWE-787 (OOB Write)
- Attack Vector: Network (Remote)
- Affected Component: inflate.c (PNGdec module)
- Root Cause: Unchecked pointer offset in zmemcpy
Affected Systems
- FASTSHIFT X-TRACK Firmware <= 2.7
-
FASTSHIFT X-TRACK: <= 2.7 (Fixed in:
2.8)
Code Analysis
Commit: 7290135
Fix buffer overflow in inflate.c (Partial regression introduced)
--- a/inflate.c
+++ b/inflate.c
+ len = state->head->extra_len - state->length;
if (state->head != Z_NULL &&
- state->head->extra != Z_NULL) {
- len = state->head->extra_len - state->length;
+ state->head->extra != Z_NULL &&
+ len < state->head->extra_max) {
Exploit Details
- GitHub: Original discussion and PoC for the upstream zlib vulnerability (CVE-2022-37434)
Mitigation Strategies
- Immediate Firmware Update: Flash the device to version 2.8 or later immediately.
- Network Isolation: Do not connect the device to untrusted public Wi-Fi networks until patched.
- File Hygiene: Avoid loading custom map packs or PNG assets from unverified third-party forums.
Remediation Steps:
- Download the latest firmware from the FASTSHIFT repository or official updater tool.
- For developers compiling from source: Apply Pull Request #120 manually.
- For developers fixing the regression: Move the 'len' calculation inside the 'if (state->head != Z_NULL)' block to avoid the NULL pointer crash.
References
Read the full report for CVE-2026-24823 on our website for more details including interactive diagrams and full exploit analysis.
Top comments (0)