PT-2026-23408 · Unknown · Dns Unpack Name
0Xkato
·
Published
2026-03-05
·
Updated
2026-03-09
·
CVE-2026-1678
CVSS v3.1
9.8
Critical
| AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Zephyr RTOS (affected versions not specified)
Description
The
dns unpack name() function in Zephyr RTOS contains a flaw where it caches the buffer tailroom and reuses it when appending DNS labels. As the buffer expands, the cached size becomes inaccurate, potentially leading to a write beyond the buffer's boundaries when the final null terminator is written. This out-of-bounds write can be triggered by a malicious DNS response when assertions are disabled, which is the default configuration, if CONFIG DNS RESOLVER is enabled. The issue can lead to remote code execution (RCE) on IoT devices.Recommendations
At the moment, there is no information about a newer version that contains a fix for this vulnerability.
Exploit
RCE
Memory Corruption
Found an issue in the description? Have something to add? Feel free to write us 👾
Weakness Enumeration
Related Identifiers
Affected Products
Dns Unpack Name