CVE-2025-34468
libcoap Stack-Based Buffer Overflow in Address Resolution DoS or Potential RCE
CVSS Score
0.0
EPSS Score
0.0%
EPSS Percentile
0th
libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).
| CWE | CWE-121 |
| Vendor | libcoap |
| Product | libcoap |
| Published | Dec 31, 2025 |
| Last Updated | Mar 23, 2026 |
Stay Ahead of the Next One
Get instant alerts for libcoap libcoap
Be the first to know when new unknown vulnerabilities affecting libcoap libcoap are published โ delivered to Slack, Telegram or Discord.
Get Free Alerts โ
Free ยท No credit card ยท 60 sec setup
Affected Versions
libcoap / libcoap
0 โค 4.3.5
References
Credits
SecMate