Description
A security flaw has been discovered in pymumu SmartDNS up to 47.1. This vulnerability affects the function _dns_decode_rr_head/_dns_decode_SVCB_HTTPS of the file src/dns.c of the component SVBC Record Parser. The manipulation results in stack-based buffer overflow. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is stated that the exploitability is difficult. The patch is identified as 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Applying a patch is advised to resolve this issue.
INFO
Published Date :
2026-01-26T07:32:06.516Z
Last Modified :
2026-02-23T08:58:07.493Z
Source :
VulDB
AFFECTED PRODUCTS
The following products are affected by CVE-2026-1425 vulnerability.
| Vendors | Products |
|---|---|
| Pymumu |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-1425.