Impact
A stack‑based buffer overflow exists in the lwIP snmpv3 USM Handler function snmp_parse_inbound_frame when a specially crafted msgAuthenticationParameters value is supplied. The overflow occurs on the stack and is triggered by a remote attacker sending a manipulated SNMPv3 frame, potentially allowing arbitrary code execution. The CVSS score of 9.3 reflects this high‑severity impact on confidentiality, integrity and availability.
Affected Systems
The flaw affects all lwIP versions up to and including 2.2.1. The vulnerable code resides in src/apps/snmp/snmp_msg.c within the snmpv3 USM Handler component. Systems that run lwIP libraries or firmware versions 2.2.1 or older are at risk if the SNMPv3 USM interface is enabled.
Risk and Exploitability
The CVSS indicates a critical risk level and the EPSS score is unavailable, suggesting the exploitation probability is currently unknown but potentially high. The vulnerability is not listed in CISA’s KEV catalog. Exploitation requires remote access to the SNMPv3 interface; an attacker could target exposed SNMP ports over the network to trigger the overflow.
OpenCVE Enrichment