LeakyCreds
NewInstant webhook alerts now available — notified within seconds of any credential detection.Learn more →

CVE-2026-1678 - Vulnerability Analysis

CriticalCVSS: 9.4

Last Updated: March 5, 2026

DNS Resolver - Out of Bounds Write

Published: March 5, 2026Updated: March 5, 2026Remote Exploitable

Overview

A DNS resolver with CONFIG_DNS_RESOLVER enabled contains a buffer overflow caused by incorrect buffer tailroom caching in dns_unpack_name(), letting attackers trigger out-of-bounds write via malicious DNS response, exploit requires crafted DNS response.

Severity & Score

Severity: Critical
CVSS Score: 9.4
EPSS Score: 5.3%(Probability of exploitation in next 30 days)

Impact

Attackers can cause out-of-bounds write, potentially leading to memory corruption or denial of service.

Mitigation

Update to the latest version with the fix for buffer tailroom caching issue.

Social Media Activity(1 post)

Patrick Mevzek
Patrick Mevzek
@pmevzek
Apr 1, 2026

@drewtowler @mdreid "Proof": https://www.0xkato.xyz/CVE-2026-1678-DNS-Parser-Overflow-in-Zephyr/ "critical out-of-bounds write in Zephyr’s DNS name parser, dns_unpack_name()". My lemmas remain that 1) any given software dealing with DNS will have a bug related to parsing and 2) any given software dealing with text will have a bug related to Unicode complexity. Works. All. The. Time.

View original post

Details

CVE ID
CVE-2026-1678
Severity
Critical
CVSS Score
9.4
Type
out_of_bounds_rw
Status
unconfirmed
EPSS
5.3%
Social Posts
1

CWE

  • CWE-787

CVSS Metrics

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H

EPSS Score

5.3%Probability of exploitation in the next 30 days