Description
A vulnerability was found in lwIP up to 2.2.1. Affected is the function snmp_parse_inbound_frame of the file src/apps/snmp/snmp_msg.c of the component snmpv3 USM Handler. Performing a manipulation of the argument msgAuthenticationParameters results in stack-based buffer overflow. The attack may be initiated remotely. The patch is named 0c957ec03054eb6c8205e9c9d1d05d90ada3898c. It is suggested to install a patch to address this issue.
Problem types
Timeline
| 2026-05-18: | Advisory disclosed |
| 2026-05-18: | VulDB entry created |
| 2026-05-18: | VulDB entry last update |
Credits
0rbitingZer0 (VulDB User)
References
vuldb.com/vuln/364474 (VDB-364474 | lwIP snmpv3 USM snmp_msg.c snmp_parse_inbound_frame stack-based overflow)
vuldb.com/vuln/364474/cti (VDB-364474 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/submit/829798 (Submit #829798 | lwIP 2.1.0 Stack-based Buffer Overflow)
savannah.nongnu.org/bugs/?68194
cgit.git.savannah.gnu.org/...054eb6c8205e9c9d1d05d90ada3898c
github.com/...ommit/0c957ec03054eb6c8205e9c9d1d05d90ada3898c