CVE-2026-30873
OpenWrt Project jsonpath: Memory leak when processing strings, labels, and regexp tokens
OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to both 24.10.6 and 25.12.1, the jp_get_token function, which performs lexical analysis by breaking input expressions into tokens, contains a memory leak vulnerability when extracting string literals, field labels, and regular expressions using dynamic memory allocation. These extracted results are stored in a jp_opcode struct, which is later copied to a newly allocated jp_opcode object via jp_alloc_op. During this transfer, if a string was previously extracted and stored in the initial jp_opcode, it is copied to the new allocation but the original memory is never freed, resulting in a memory leak. This issue has been fixed in versions 24.10.6 and 25.12.1.
| CWE | CWE-401 |
| Vendor | openwrt |
| Product | openwrt |
| Published | Mar 19, 2026 |
| Last Updated | Mar 21, 2026 |
Get instant alerts for openwrt openwrt
Be the first to know when new unknown vulnerabilities affecting openwrt openwrt are published โ delivered to Slack, Telegram or Discord.