๐Ÿ” CVE Alert

CVE-2026-30872

UNKNOWN 0.0

OpenWrt Project has a Stack-based Buffer Overflow vulnerability via IPv6 reverse DNS lookup

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
26th

OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to 24.10.6 and 25.12.1, the mdns daemon has a Stack-based Buffer Overflow vulnerability in the match_ipv6_addresses function, triggered when processing PTR queries for IPv6 reverse DNS domains (.ip6.arpa) received via multicast DNS on UDP port 5353. During processing, the domain name from name_buffer is copied via strcpy into a fixed 256-byte stack buffer, and then the reverse IPv6 request is extracted into a buffer of only 46 bytes (INET6_ADDRSTRLEN). Because the length of the data is never validated before this extraction, an attacker can supply input larger than 46 bytes, causing an out-of-bounds write. This allows a specially crafted DNS query to overflow the stack buffer in match_ipv6_addresses, potentially enabling remote code execution. This issue has been fixed in versions 24.10.6 and 25.12.1.

CWE CWE-121
Vendor openwrt
Product openwrt
Published Mar 19, 2026
Last Updated Mar 25, 2026
Stay Ahead of the Next One

Get instant alerts for openwrt openwrt

Be the first to know when new unknown vulnerabilities affecting openwrt openwrt are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

openwrt / openwrt
>= 25.12.0-rc1, < 25.12.1 < 24.10.6

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
github.com: https://github.com/openwrt/openwrt/security/advisories/GHSA-mpgh-v658-jqv5 github.com: https://github.com/openwrt/openwrt/releases/tag/v24.10.6 github.com: https://github.com/openwrt/openwrt/releases/tag/v25.12.1