Impact
A stack-based buffer overflow in the SVBC Record parser (function _dns_decode_SVCB_HTTPS in src/dns.c) allows attackers to supply crafted DNS messages that overflow the stack and potentially execute arbitrary code. The flaw exists in SmartDNS versions up to 47.1 and can be triggered remotely without authentication. The vulnerability is classified under CWE‑119 and CWE‑121, indicating unsafe buffer handling and improper stack management.
Affected Systems
The affected product is pymumu SmartDNS up to version 47.1. This version range is listed by the CNA and covers all SmartDNS releases that include the SVBC parsing logic.
Risk and Exploitability
The CVSS score is 6.3, indicating moderate severity. The EPSS score is below 1%, showing a very low current exploitation probability, and the vulnerability is not listed in KEV. However, because the bug can be triggered remotely and leads to code execution, its impact is significant if an attacker can reach the server. Exploitation complexity is considered high by the vendor, implying that while feasible, it requires significant effort.
OpenCVE Enrichment