CVE-2026-1425

A security flaw has been discovered in pymumu SmartDNS up to 47.1. This vulnerability affects the function _dns_decode_rr_head/_dns_decode_SVCB_HTTPS of the file src/dns.c of the component SVBC Record Parser. The manipulation results in stack-based buffer overflow. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is stated that the exploitability is difficult. The patch is identified as 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Applying a patch is advised to resolve this issue.
Configurations

No configuration.

History

15 Apr 2026, 00:35

Type Values Removed Values Added
Summary
  • (es) Se ha descubierto una falla de seguridad en pymumu SmartDNS hasta la versión 47.1. Esta vulnerabilidad afecta a la función _dns_decode_rr_head/_dns_decode_SVCB_HTTPS del archivo src/dns.c del componente SVBC Record Parser. La manipulación resulta en un desbordamiento de búfer basado en pila. Es posible lanzar el ataque de forma remota. Un alto nivel de complejidad está asociado con este ataque. Se afirma que la explotabilidad es difícil. El parche se identifica como 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Se aconseja aplicar un parche para resolver este problema.

23 Feb 2026, 09:16

Type Values Removed Values Added
References
  • () https://github.com/pymumu/smartdns/ -

26 Jan 2026, 08:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-01-26 08:16

Updated : 2026-04-15 00:35


NVD link : CVE-2026-1425

Mitre link : CVE-2026-1425

CVE.ORG link : CVE-2026-1425


JSON object : View

Products Affected

No product.

CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow