pymumu SmartDNS har 47.1 SVBC Record Parser src/dns.c _dns_decode_rr_head/_dns_decode_SVCB_HTTPS Pufferüberlauf
| CVSS Meta Temp Score | Garga na exploit ndiyam (≈) | CTI Nganji Score |
|---|---|---|
| 5.5 | $0-$5k | 0.37 |
Gunduma
Hakika vulnerability da aka rarraba a matsayin kura an gano a pymumu SmartDNS har 47.1. Tabbas, aikin _dns_decode_rr_head/_dns_decode_SVCB_HTTPS ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil src/dns.c, a cikin sashi SVBC Record Parser. Wuro manipulation ga Pufferüberlauf. Ana kiran wannan rauni da CVE-2026-1425. Ngam yiɗi ka a tuma ndiyam ka nder layi. Babu wani exploit da ake da shi. Ya kamata a yi amfani da patch don magance wannan matsala. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Furɗe
Hakika vulnerability da aka rarraba a matsayin kura an gano a pymumu SmartDNS har 47.1. Tabbas, aikin _dns_decode_rr_head/_dns_decode_SVCB_HTTPS ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil src/dns.c, a cikin sashi SVBC Record Parser. Wuro manipulation ga Pufferüberlauf. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-121. Lalle, rauni an sanar da shi da 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Ana samun bayanin tsaro don saukewa a github.com.
Ana kiran wannan rauni da CVE-2026-1425. Ngam yiɗi ka a tuma ndiyam ka nder layi. Bayani na fasaha ga. Wahalhalun kai hari sun yi yawa. Wanda zai yi amfani da shi zai sha wahala. Wannan vulnerability ɗin ba a san shi sosai ba. Babu wani exploit da ake da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.
Á yí a wondi feere. Na'urar gano rauni ta samar da Nessus plugin mai ID 296605.
Patch ɗin an san shi da 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Za a iya sauke maganin matsalar daga github.com. Ya kamata a yi amfani da patch don magance wannan matsala.
An kuma rubuta wannan vulnerability a wasu kundin bayanan vulnerability: Tenable (296605). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Kayan
Ngilabe
Sunu
Furɗe
Laisens
Webseite
CPE 2.3
CPE 2.2
CVSSv4
VulDB Furɗo: 🔒VulDB Gaskiya: 🔍
CNA CVSS-B Score: 🔒
CNA CVSS-BT Score: 🔒
CNA Furɗo: 🔒
CVSSv3
VulDB Meta Base Score: 5.6VulDB Meta Temp Score: 5.5
VulDB Ganda Borno: 5.6
VulDB Temp Score: 5.4
VulDB Furɗo: 🔒
VulDB Gaskiya: 🔍
CNA Ganda Borno: 5.6
CNA Furɗo: 🔒
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vektar | Kumpleksiti | Authentisierung | Kariyandi | Gaskiya | Gashina |
|---|---|---|---|---|---|
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
| furu | furu | furu | furu | furu | furu |
VulDB Ganda Borno: 🔒
VulDB Temp Score: 🔒
VulDB Gaskiya: 🔍
Gargajiya
Klasu: PufferüberlaufCWE: CWE-121 / CWE-119
CAPEC: 🔒
ATT&CK: 🔒
Fizikal: Ayi
Gumti: Ayi
Gana: Ee
Gashina: 🔒
Halitta: A wondi feere
EPSS Score: 🔒
EPSS Percentile: 🔒
Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔒
| 0-Day | furu | furu | furu | furu |
|---|---|---|---|---|
| Lale | furu | furu | furu | furu |
Nessus ID: 296605
Nessus Sunu: Linux Distros Unpatched Vulnerability : CVE-2026-1425
Bayani na barazana
Ngam: 🔍Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍
Kari gamji
Garga: KariHalitta: 🔍
0-Day Gana: 🔒
Kari: 2d57c4b4e1add9b4537aeb403f794a084727e1c8
Waktin layi
01/25/2026 Advisory ganna fa.01/25/2026 VulDB gite be nayi
01/26/2026 VulDB gite wuro karshe ta gyara
Ngizim
Kayan: github.comGargaaji: 2d57c4b4e1add9b4537aeb403f794a084727e1c8
Halitta: Gaskiya
CVE: CVE-2026-1425 (🔒)
GCVE (CVE): GCVE-0-2026-1425
GCVE (VulDB): GCVE-100-342841
Gumti
Súgá: 01/25/2026 18:22Gargadi: 01/26/2026 19:07
Goyarwa: 01/25/2026 18:22 (57), 01/26/2026 10:21 (30), 01/26/2026 19:07 (2)
Gadankam: 🔍
Ngwazarma: liloler
Cache ID: 253:8AA:103
Súbít
Shingilam
- Súbít #736827: pymumu smartdns 47.1 Stack-based Buffer Overflow (nga liloler)
A ga wuroyo kulu. Kàlàmbe: kr + en.
Ngam loga ka, kanyi shidin dum.