PT-2026-23408 · Unknown · Dns Unpack Name

0Xkato

·

Published

2026-03-05

·

Updated

2026-03-09

·

CVE-2026-1678

CVSS v3.1

9.8

Critical

AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Name of the Vulnerable Software and Affected Versions Zephyr RTOS (affected versions not specified)
Description The dns unpack name() function in Zephyr RTOS contains a flaw where it caches the buffer tailroom and reuses it when appending DNS labels. As the buffer expands, the cached size becomes inaccurate, potentially leading to a write beyond the buffer's boundaries when the final null terminator is written. This out-of-bounds write can be triggered by a malicious DNS response when assertions are disabled, which is the default configuration, if CONFIG DNS RESOLVER is enabled. The issue can lead to remote code execution (RCE) on IoT devices.
Recommendations At the moment, there is no information about a newer version that contains a fix for this vulnerability.

Exploit

RCE

Memory Corruption

Weakness Enumeration

Related Identifiers

CVE-2026-1678
GHSA-536F-H63G-HJ42

Affected Products

Dns Unpack Name