CVE-2026-1678 - Vulnerability Analysis
CriticalCVSS: 9.4Last Updated: March 5, 2026
DNS Resolver - Out of Bounds Write
Overview
A DNS resolver with CONFIG_DNS_RESOLVER enabled contains a buffer overflow caused by incorrect buffer tailroom caching in dns_unpack_name(), letting attackers trigger out-of-bounds write via malicious DNS response, exploit requires crafted DNS response.
Severity & Score
Impact
Attackers can cause out-of-bounds write, potentially leading to memory corruption or denial of service.
Mitigation
Update to the latest version with the fix for buffer tailroom caching issue.
Social Media Activity(1 post)
@drewtowler @mdreid "Proof": https://www.0xkato.xyz/CVE-2026-1678-DNS-Parser-Overflow-in-Zephyr/ "critical out-of-bounds write in Zephyr’s DNS name parser, dns_unpack_name()". My lemmas remain that 1) any given software dealing with DNS will have a bug related to parsing and 2) any given software dealing with text will have a bug related to Unicode complexity. Works. All. The. Time.
View original postRelated Resources
Details
- CVE ID
- CVE-2026-1678
- Severity
- Critical
- CVSS Score
- 9.4
- Type
- out_of_bounds_rw
- Status
- unconfirmed
- EPSS
- 5.3%
- Social Posts
- 1
CWE
- CWE-787
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:H/A:H