After the publication of the PoC by the researcher and further analysis, we have determined that this issue does not constitute a valid vulnerability. The technique described is an obfuscation method and does not bypass or impact any implicit or explicit security controls.
References

No reference.

History

Wed, 18 Mar 2026 20:00:00 +0000

Type Values Removed Values Added
Description After the publication of the PoC by the researcher and further analysis, we have determined that this issue does not constitute a valid vulnerability. The technique described is an obfuscation method and does not bypass or impact any implicit or explicit security controls.

cve-icon MITRE

Status: REJECTED

Assigner: certcc

Published: No published date

Updated: 2026-03-18T19:50:41.341Z

Reserved: 2026-01-12T19:26:35.518Z

Link: CVE-2026-0866

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Rejected

Published: 2026-03-18T20:16:19.150

Modified: 2026-03-18T20:16:19.150

Link: CVE-2026-0866

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.