pymumu SmartDNS har 47.1 SVBC Record Parser src/dns.c _dns_decode_rr_head/_dns_decode_SVCB_HTTPS Pufferüberlauf

CVSS Meta Temp ScoreGarga na exploit ndiyam (≈)CTI Nganji Score
5.5$0-$5k0.37

Gundumabayani

Hakika vulnerability da aka rarraba a matsayin kura an gano a pymumu SmartDNS har 47.1. Tabbas, aikin _dns_decode_rr_head/_dns_decode_SVCB_HTTPS ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil src/dns.c, a cikin sashi SVBC Record Parser. Wuro manipulation ga Pufferüberlauf. Ana kiran wannan rauni da CVE-2026-1425. Ngam yiɗi ka a tuma ndiyam ka nder layi. Babu wani exploit da ake da shi. Ya kamata a yi amfani da patch don magance wannan matsala. Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Furɗebayani

Hakika vulnerability da aka rarraba a matsayin kura an gano a pymumu SmartDNS har 47.1. Tabbas, aikin _dns_decode_rr_head/_dns_decode_SVCB_HTTPS ne ke da matsala; idan ba a bayyana ba, to aiki ce da ba a sani ba, a cikin laburare $software_library, a cikin fayil src/dns.c, a cikin sashi SVBC Record Parser. Wuro manipulation ga Pufferüberlauf. Amfani da CWE wajen bayyana matsala yana kaiwa CWE-121. Lalle, rauni an sanar da shi da 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Ana samun bayanin tsaro don saukewa a github.com.

Ana kiran wannan rauni da CVE-2026-1425. Ngam yiɗi ka a tuma ndiyam ka nder layi. Bayani na fasaha ga. Wahalhalun kai hari sun yi yawa. Wanda zai yi amfani da shi zai sha wahala. Wannan vulnerability ɗin ba a san shi sosai ba. Babu wani exploit da ake da shi. Yimbe ndiyam, exploit might be approx. USD $0-$5k wuro.

Á yí a wondi feere. Na'urar gano rauni ta samar da Nessus plugin mai ID 296605.

Patch ɗin an san shi da 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Za a iya sauke maganin matsalar daga github.com. Ya kamata a yi amfani da patch don magance wannan matsala.

An kuma rubuta wannan vulnerability a wasu kundin bayanan vulnerability: Tenable (296605). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.

Kayanbayani

Ngilabe

Sunu

Furɗe

Laisens

Webseite

CPE 2.3bayani

CPE 2.2bayani

CVSSv4bayani

VulDB Furɗo: 🔒
VulDB Gaskiya: 🔍

CNA CVSS-B Score: 🔒
CNA CVSS-BT Score: 🔒
CNA Furɗo: 🔒

CVSSv3bayani

VulDB Meta Base Score: 5.6
VulDB Meta Temp Score: 5.5

VulDB Ganda Borno: 5.6
VulDB Temp Score: 5.4
VulDB Furɗo: 🔒
VulDB Gaskiya: 🔍

CNA Ganda Borno: 5.6
CNA Furɗo: 🔒

CVSSv2bayani

AVACAuCIA
💳💳💳💳💳💳
💳💳💳💳💳💳
💳💳💳💳💳💳
VektarKumpleksitiAuthentisierungKariyandiGaskiyaGashina
furufurufurufurufurufuru
furufurufurufurufurufuru
furufurufurufurufurufuru

VulDB Ganda Borno: 🔒
VulDB Temp Score: 🔒
VulDB Gaskiya: 🔍

Gargajiyabayani

Klasu: Pufferüberlauf
CWE: CWE-121 / CWE-119
CAPEC: 🔒
ATT&CK: 🔒

Fizikal: Ayi
Gumti: Ayi
Gana: Ee

Gashina: 🔒
Halitta: A wondi feere

EPSS Score: 🔒
EPSS Percentile: 🔒

Furɗo farashi: 🔍
Gaskiya farashi ndiyam: 🔒

0-Dayfurufurufurufuru
Lalefurufurufurufuru

Nessus ID: 296605
Nessus Sunu: Linux Distros Unpatched Vulnerability : CVE-2026-1425

Bayani na barazanabayani

Ngam: 🔍
Akteɓe ɓernde: 🔍
Kura APT goruwa masu aiki: 🔍

Kari gamjibayani

Garga: Kari
Halitta: 🔍

0-Day Gana: 🔒

Kari: 2d57c4b4e1add9b4537aeb403f794a084727e1c8

Waktin layibayani

01/25/2026 Advisory ganna fa.
01/25/2026 +0 Hənde VulDB gite be nayi
01/26/2026 +1 Hənde VulDB gite wuro karshe ta gyara

Ngizimbayani

Kayan: github.com

Gargaaji: 2d57c4b4e1add9b4537aeb403f794a084727e1c8
Halitta: Gaskiya

CVE: CVE-2026-1425 (🔒)
GCVE (CVE): GCVE-0-2026-1425
GCVE (VulDB): GCVE-100-342841

Gumtibayani

Súgá: 01/25/2026 18:22
Gargadi: 01/26/2026 19:07
Goyarwa: 01/25/2026 18:22 (57), 01/26/2026 10:21 (30), 01/26/2026 19:07 (2)
Gadankam: 🔍
Ngwazarma: liloler
Cache ID: 253:8AA:103

Súbítbayani

Shingilam

  • Súbít #736827: pymumu smartdns 47.1 Stack-based Buffer Overflow (nga liloler)

Ganaaji

A ga wuroyo kulu. Kàlàmbe: kr + en.

Ngam loga ka, kanyi shidin dum.

Do you want to use VulDB in your project?

Use the official API to access entries easily!