Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
OpenWrt Project has a Stack-based Buffer Overflow vulnerability via IPv6 reverse DNS lookup
Vulnerability Description
OpenWrt Project is a Linux operating system targeting embedded devices. In versions prior to 24.10.6 and 25.12.1, the mdns daemon has a Stack-based Buffer Overflow vulnerability in the match_ipv6_addresses function, triggered when processing PTR queries for IPv6 reverse DNS domains (.ip6.arpa) received via multicast DNS on UDP port 5353. During processing, the domain name from name_buffer is copied via strcpy into a fixed 256-byte stack buffer, and then the reverse IPv6 request is extracted into a buffer of only 46 bytes (INET6_ADDRSTRLEN). Because the length of the data is never validated before this extraction, an attacker can supply input larger than 46 bytes, causing an out-of-bounds write. This allows a specially crafted DNS query to overflow the stack buffer in match_ipv6_addresses, potentially enabling remote code execution. This issue has been fixed in versions 24.10.6 and 25.12.1.
CVSS Information
N/A
Vulnerability Type
栈缓冲区溢出
Vulnerability Title
OpenWrt 安全漏洞
Vulnerability Description
OpenWrt是OpenWrt开源的一套针对嵌入式设备的Linux操作系统。 OpenWrt 24.10.6之前版本和25.12.1之前版本存在安全漏洞,该漏洞源于mdns守护进程的match_ipv6_addresses函数存在栈缓冲区溢出,可能导致远程代码执行。
CVSS Information
N/A
Vulnerability Type
N/A