CVE-2026-27831 - Vulnerability Analysis
HighCVSS: 7.5Last Updated: February 27, 2026
rldns - Denial of Service
Published: February 26, 2026Updated: February 27, 2026PoC AvailableRemote Exploitable
Overview
rldns 2.3 contains a heap-based out-of-bounds read in the DNS server component, letting attackers cause denial of service, exploit requires no special privileges.
Severity & Score
Severity: High
CVSS Score: 7.5
EPSS Score: 4.1%(Probability of exploitation in next 30 days)
Impact
Attackers can cause denial of service by triggering a heap-based out-of-bounds read.
Mitigation
Update to version 1.4 or later.
References
- https://github.com/bluedragonsecurity/rldns_archives/blob/main/diff/rldns-1.4.diff
- https://medium.com/@w1sdom/heap-based-buffer-over-read-vulnerability-in-rldns-1-3-5da3bccdc031
- https://github.com/bluedragonsecurity/rldns-1.3-heap-out-of-bounds-vulnerability-fixed-in-rldns-1.4
- https://github.com/bluedragonsecurity/rldns/security/advisories/GHSA-fv38-45j4-g9x4
Social Media Activity(1 post)
TheHackerWire
@thehackerwire
š CVE-2026-27831 - High (7.5) rldns is an open source DNS server. Version 2.3 has a heap-based out-of-bounds read that leads to denial of service. Version 1.4 contains a patch for the issue. š https://www.thehackerwire.com/vulnerability/CVE-2026-27831/ #CVE #vulnerability #infosec #cybersecurity #security #Tenda #patchstack
View original postGitHub Repositories(1 repo)
Related Resources
Details
- CVE ID
- CVE-2026-27831
- Severity
- High
- CVSS Score
- 7.5
- Type
- out_of_bounds_rw
- Status
- unconfirmed
- EPSS
- 4.1%
- Social Posts
- 1
CWE
- CWE-125
CVSS Metrics
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
EPSS Score
4.1%Probability of exploitation in the next 30 days