CVE-2026-30871

OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to 24.10.6 and 25.12.1, the mdns daemon has a Stack-based Buffer Overflow vulnerability in the parse_question function. The issue is triggered by PTR queries for reverse DNS domains (.in-addr.arpa and .ip6.arpa). DNS packets received on UDP port 5353 are expanded by dn_expand into an 8096-byte global buffer (name_buffer), which is then copied via an unbounded strcpy into a fixed 256-byte stack buffer when handling TYPE_PTR queries. The overflow is possible because dn_expand converts non-printable ASCII bytes (e.g., 0x01) into multi-character octal representations (e.g., \001), significantly inflating the expanded name beyond the stack buffer's capacity. A crafted DNS packet can exploit this expansion behavior to overflow the stack buffer, making the vulnerability reachable through normal multicast DNS packet processing. This issue has been fixed in versions 24.10.6 and 25.12.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:openwrt:openwrt:*:*:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:*:*:*:*:*:*:*:*

History

24 Mar 2026, 14:07

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
References () https://github.com/openwrt/openwrt/releases/tag/v24.10.6 - () https://github.com/openwrt/openwrt/releases/tag/v24.10.6 - Release Notes
References () https://github.com/openwrt/openwrt/releases/tag/v25.12.1 - () https://github.com/openwrt/openwrt/releases/tag/v25.12.1 - Release Notes
References () https://github.com/openwrt/openwrt/security/advisories/GHSA-7c3j-f7w2-p8f6 - () https://github.com/openwrt/openwrt/security/advisories/GHSA-7c3j-f7w2-p8f6 - Vendor Advisory
Summary
  • (es) El Proyecto OpenWrt es un sistema operativo Linux dirigido a dispositivos embebidos. En versiones anteriores a la 24.10.6 y 25.12.1, el demonio mdns tiene una vulnerabilidad de desbordamiento de búfer basado en pila en la función parse_question. El problema se activa por consultas PTR para dominios DNS inversos (.in-addr.arpa y .ip6.arpa). Los paquetes DNS recibidos en el puerto UDP 5353 son expandidos por dn_expand en un búfer global de 8096 bytes (name_buffer), que luego se copia mediante un strcpy sin límites en un búfer de pila fijo de 256 bytes al manejar consultas TYPE_PTR. El desbordamiento es posible porque dn_expand convierte bytes ASCII no imprimibles (p. ej., 0x01) en representaciones octales de múltiples caracteres (p. ej., \001), inflando significativamente el nombre expandido más allá de la capacidad del búfer de pila. Un paquete DNS manipulado puede explotar este comportamiento de expansión para desbordar el búfer de pila, haciendo que la vulnerabilidad sea alcanzable a través del procesamiento normal de paquetes DNS multicast. Este problema ha sido corregido en las versiones 24.10.6 y 25.12.1.
CPE cpe:2.3:o:openwrt:openwrt:*:*:*:*:*:*:*:*
First Time Openwrt
Openwrt openwrt

19 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 22:16

Updated : 2026-03-24 14:07


NVD link : CVE-2026-30871

Mitre link : CVE-2026-30871

CVE.ORG link : CVE-2026-30871


JSON object : View

Products Affected

openwrt

  • openwrt
CWE
CWE-121

Stack-based Buffer Overflow