Impact
The flaw is a stack‑based buffer overflow in the mdns daemon of OpenWrt. In the parse_question function a 256‑byte stack buffer is filled by copying an 8,096‑byte global buffer that has been expanded by dn_expand. Because dn_expand converts non‑printable ASCII bytes into escaped octal sequences, a crafted PTR DNS query inflates the name beyond the stack space, allowing the overflow. The result is that an attacker can potentially execute arbitrary code on the device.
Affected Systems
All OpenWrt installations running the mdns daemon before the release of version 24.10.6 or 25.12.1 are impacted. The vulnerability is triggered by normal multicast DNS traffic on UDP port 5353 and is present in devices that use the default mdns service provided by OpenWrt.
Risk and Exploitability
The score of 9.5 indicates a high severity, but the EPSS score of less than 1% suggests that it is currently unlikely to be exploited. The vulnerability is not yet listed in the CISA KEV catalog. Exploitation requires crafting a specific DNS packet that targets the PTR query handling over UDP 5353, a typical network access vector for devices on local networks.
OpenCVE Enrichment