Impact
An out‑of‑bounds write occurs during IPv6 Router Advertisement processing when the prefix length field is not validated. An adjacent network actor can send a crafted RA packet with a prefix length exceeding the maximum allowed value, causing a heap buffer overflow and memory corruption on the device, potentially enabling arbitrary code execution.
Affected Systems
The flaw affects AWS FreeRTOS‑Plus‑TCP implementations before version 4.2.6 and 4.4.1. Users that only process IPv4 Router Advertisements are not impacted.
Risk and Exploitability
The CVSS score of 6.1 indicates moderate severity, and the exploit probability is not available. The vulnerability is not listed in the CISA KEV catalog. The most likely attack vector involves an adjacent or local network actor that can inject a malicious RA packet to trigger the buffer overflow.
OpenCVE Enrichment