Impact
A stack based buffer overflow was found in the handle_mdns_record function of the Cesanta library. Supplying a specially crafted buffer to the mDNS record handler can overflow the stack, allowing an attacker to execute arbitrary code. The weakness is a classic stack based buffer overflow.
Affected Systems
Any deployment using Cesanta Mongoose version 7.20 or earlier is vulnerable. The library is used in embedded and network applications that implement mDNS. Cesanta released version 7.21, identified by commit 0d882f1b43ff2308b7486a56a9d60cd6dba8a3f1, which contains the fix.
Risk and Exploitability
The CVSS score of 6.3 classifies the vulnerability as medium severity. EPSS information is not available and the issue is not listed in CISA's KEV catalog. A public exploit exists, though the attack requires precise packet manipulation and is considered difficult. Remote exploitation is possible over a network connection to the mDNS port, but the complexity makes it less likely to be widely abused.
OpenCVE Enrichment