CVE-2026-30872

OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to 24.10.6 and 25.12.1, the mdns daemon has a Stack-based Buffer Overflow vulnerability in the match_ipv6_addresses function, triggered when processing PTR queries for IPv6 reverse DNS domains (.ip6.arpa) received via multicast DNS on UDP port 5353. During processing, the domain name from name_buffer is copied via strcpy into a fixed 256-byte stack buffer, and then the reverse IPv6 request is extracted into a buffer of only 46 bytes (INET6_ADDRSTRLEN). Because the length of the data is never validated before this extraction, an attacker can supply input larger than 46 bytes, causing an out-of-bounds write. This allows a specially crafted DNS query to overflow the stack buffer in match_ipv6_addresses, potentially enabling remote code execution. This issue has been fixed in versions 24.10.6 and 25.12.1.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:openwrt:openwrt:*:*:*:*:*:*:*:*
cpe:2.3:o:openwrt:openwrt:*:*:*:*:*:*:*:*

History

24 Mar 2026, 14:05

Type Values Removed Values Added
References () https://github.com/openwrt/openwrt/releases/tag/v24.10.6 - () https://github.com/openwrt/openwrt/releases/tag/v24.10.6 - Release Notes
References () https://github.com/openwrt/openwrt/releases/tag/v25.12.1 - () https://github.com/openwrt/openwrt/releases/tag/v25.12.1 - Release Notes
References () https://github.com/openwrt/openwrt/security/advisories/GHSA-mpgh-v658-jqv5 - () https://github.com/openwrt/openwrt/security/advisories/GHSA-mpgh-v658-jqv5 - Vendor Advisory
CPE cpe:2.3:o:openwrt:openwrt:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 9.8
First Time Openwrt
Openwrt openwrt
Summary
  • (es) Proyecto OpenWrt es un sistema operativo Linux dirigido a dispositivos embebidos. En versiones anteriores a la 24.10.6 y 25.12.1, el demonio mdns tiene una vulnerabilidad de desbordamiento de búfer basado en pila en la función match_ipv6_addresses, que se activa al procesar consultas PTR para dominios DNS inversos IPv6 (.ip6.arpa) recibidas a través de DNS multicast en el puerto UDP 5353. Durante el procesamiento, el nombre de dominio de name_buffer se copia mediante strcpy en un búfer de pila fijo de 256 bytes, y luego la solicitud IPv6 inversa se extrae en un búfer de solo 46 bytes (INET6_ADDRSTRLEN). Debido a que la longitud de los datos nunca se valida antes de esta extracción, un atacante puede proporcionar una entrada mayor de 46 bytes, causando una escritura fuera de límites. Esto permite que una consulta DNS especialmente diseñada desborde el búfer de pila en match_ipv6_addresses, lo que podría permitir la ejecución remota de código. Este problema ha sido corregido en las versiones 24.10.6 y 25.12.1.

19 Mar 2026, 22:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-19 22:16

Updated : 2026-03-24 14:05


NVD link : CVE-2026-30872

Mitre link : CVE-2026-30872

CVE.ORG link : CVE-2026-30872


JSON object : View

Products Affected

openwrt

  • openwrt
CWE
CWE-121

Stack-based Buffer Overflow