diff --git a/SPECS/erlang/CVE-2026-21620.patch b/SPECS/erlang/CVE-2026-21620.patch
new file mode 100644
index 00000000000..5edeb404e25
--- /dev/null
+++ b/SPECS/erlang/CVE-2026-21620.patch
@@ -0,0 +1,638 @@
+From db333c2b5a02fe6d70b691b7fdcc44fef9c3340c Mon Sep 17 00:00:00 2001
+From: Raimo Niskanen Step 1. Create a sample file to be used for the transfer: Step 2. Start the TFTP server:
+- $ echo "Erlang/OTP 21" > file.txt
++ $ echo "Erlang/OTP 21" > /tmp/file.txt
+
+
+
+- 1> {ok, Pid} = tftp:start([{port, 19999}]).
++ 1> Callback = {callback,{"",tftp_file,[{root_dir,"/tmp"}]}}.
++ 2> {ok, Pid} = tftp:start([{port, 19999}, Callback]).
+ }]]>
+
+
+diff --git a/lib/tftp/doc/src/introduction.xml b/lib/tftp/doc/src/introduction.xml
+index 70761db..1ce0091 100644
+--- a/lib/tftp/doc/src/introduction.xml
++++ b/lib/tftp/doc/src/introduction.xml
+@@ -4,7 +4,7 @@
+
The
The only feature that not is implemented is the
++ As stated in
++ (
++ This essentially means that any machine on the network ++ that can reach the TFTP server is able to read and write, ++ without authentication, any file on the machine that runs ++ the TFTP server, that the user (or group) that runs the TFTP server ++ (in this case the Erlang VM) is allowed to read or write. ++ The machine configuration has to be prepared for that. ++
++
++ The default behavior mentioned above is in general very risky,
++ and as a remedy, this TFTP application's default callback
++
+
+-
Registration of a callback module. When a file is to be
+ transferred, its local filename is matched to the regular
+ expressions of the registered callbacks. The first matching
+@@ -144,8 +144,34 @@
+
The callback module must implement the
The callback module must implement the
++ At the end of the list of callbacks there are always
++ the default callbacks
++ The
++ The default callback module configuration allows
++ access to any file on any local filesystem that is
++ readable or writable by the user running the Erlang VM.
++ This can be a security vulnerability. It is therefore
++ recommended to explicitly configure the
++ The request filename is matched against the regexps ++ of the registered callback modules, and the first match ++ selects the callback to handle the request. ++
++
++ If there are no registered callback modules,
++
++ The default callback module configuration allows
++ access to any file on any local filesystem that is
++ readable or writable by the user running the Erlang VM.
++ This can be a security vulnerability. See the
++