CVE-2026-1678
CRITICALCVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H
Lifecycle Timeline
3Description
dns_unpack_name() caches the buffer tailroom once and reuses it while appending DNS labels. As the buffer grows, the cached size becomes incorrect, and the final null terminator can be written past the buffer. With assertions disabled (default), a malicious DNS response can trigger an out-of-bounds write when CONFIG_DNS_RESOLVER is enabled.
Analysis
Buffer overflow in Zephyr RTOS dns_unpack_name() function causing OOB writes. PoC available.
Sign in for full analysis, threat intelligence, and remediation guidance.
Remediation
Within 24 hours: Identify and inventory all systems running affected DNS software; isolate critical DNS servers from untrusted networks where possible. Within 7 days: Implement network segmentation to restrict DNS query sources, deploy DNS query rate limiting, and enable DNS request logging for threat detection. …
Sign in for detailed remediation steps.
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today