Description
Insufficient option length validation in the IPv6 Router Advertisement parser in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to cause a denial of service (device crash) by sending a crafted Router Advertisement with a truncated PREFIX_INFORMATION option that is smaller than the expected structure size.



To mitigate this issue, users should upgrade to the fixed version when available.
Published: 2026-04-29
Score: 6 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Impact

An out‑of‑bounds read occurs in the IPv6 Router Advertisement parser of FreeRTOS‑Plus‑TCP before versions V4.2.6 and V4.4.1. The parser fails to correctly validate the length of the PREFIX_INFORMATION option, allowing a crafted Router Advertisement packet to trigger a buffer overread. This can cause the device to crash, resulting in a denial of service that removes network functionality during the crash period. The flaw is a classic over‑read (CWE‑125).

Affected Systems

The vulnerability affects devices running AWS FreeRTOS‑Plus‑TCP by Amazon before the update to V4.2.6, and any instances still using the older V4.4.1 series prior to its corrected release. Any embedded systems that incorporate this TCP/IP stack without the fixed version are susceptible.

Risk and Exploitability

The CVSS score of 6.0 places it in the medium severity range, and no EPSS data is available, implying low to moderate exploitation probability. The vulnerability is not listed in the CISA KEV catalog, suggesting there are no known high‑profile attacks. The likely attack vector is local‑network based and requires an attacker adjacent to the target to send a malicious Router Advertisement. Because the flaw is exposed only through network traffic, defenders on the same subnet can potentially mitigate risk by limiting Router Advertisement reception from untrusted sources.

Generated by OpenCVE AI on April 29, 2026 at 21:08 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade AWS FreeRTOS‑Plus‑TCP to V4.2.6 or later, or to the latest V4.4 series that includes the fix.
  • If upgrade is not yet possible, isolate the device from the local network segment that can send Router Advertisements, or configure a firewall to block suspicious RA packets.
  • Monitor the device for unexpected crashes and apply tighter RA filtering rules if the stack allows disabling unused options.

Generated by OpenCVE AI on April 29, 2026 at 21:08 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Thu, 30 Apr 2026 08:30:00 +0000

Type Values Removed Values Added
First Time appeared Amazon
Amazon freertos-plus-tcp
Vendors & Products Amazon
Amazon freertos-plus-tcp

Wed, 29 Apr 2026 22:45:00 +0000


Wed, 29 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 29 Apr 2026 19:30:00 +0000

Type Values Removed Values Added
Description Insufficient option length validation in the IPv6 Router Advertisement parser in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to cause a denial of service (device crash) by sending a crafted Router Advertisement with a truncated PREFIX_INFORMATION option that is smaller than the expected structure size. To mitigate this issue, users should upgrade to the fixed version when available.
Title Out-of-Bounds Read in Router Advertisement Option Parser in FreeRTOS-Plus-TCP
Weaknesses CWE-125
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 6, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Amazon Freertos-plus-tcp
cve-icon MITRE

Status: PUBLISHED

Assigner: AMZN

Published:

Updated: 2026-04-29T22:14:08.753Z

Reserved: 2026-04-29T14:27:51.904Z

Link: CVE-2026-7425

cve-icon Vulnrichment

Updated: 2026-04-29T19:32:45.006Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-29T20:16:32.010

Modified: 2026-04-30T15:13:14.230

Link: CVE-2026-7425

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-30T08:15:31Z

Weaknesses