Impact
NanoMQ MQTT Broker version 0.24.6 contains a Null Pointer Dereference in auth_http.c:set_data() that is triggered when HTTP authentication is enabled and a client connects without providing a username or password. The bug causes a strlen() call on a NULL pointer, leading to a crash (SIGSEGV). This results in a denial of service against the broker process.
Affected Systems
The affected product is NanoMQ, a lightweight MQTT broker designed for edge environments. Vulnerable releases include version 0.24.6; the issue was fixed in 0.24.7.
Risk and Exploitability
The CVSS v3 score of 3.1 indicates low overall severity, but the impact is a service disruption that can be triggered remotely by any client connecting to the broker with auth.http_auth enabled and using placeholder values (%u and %P). EPSS suggests the likelihood of exploitation is under 1%, and the vulnerability is not listed in CISA’s KEV catalog. Despite the low probability, the remote triggerability means that an attacker can perform repeated connections to crash the broker, potentially disrupting downstream applications.
OpenCVE Enrichment