OpenWrt Project is a Linux operating system targeting embedded devices. Prior to version 24.10.4, ubusd contains a heap buffer overflow in the event registration parsing code. This allows an attacker to modify the head and potentially execute arbitrary code in the context of the ubus daemon. The affected code is executed before running the ACL checks, all ubus clients are able to send such messages. In addition to the heap corruption, the crafted subscription also results in a bypass of the listen ACL. This is fixed in OpenWrt 24.10.4. There are no workarounds.
Metrics
Affected Vendors & Products
References
History
Thu, 23 Oct 2025 10:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Linux
Linux linux Openwrt Openwrt openwrt |
|
| Vendors & Products |
Linux
Linux linux Openwrt Openwrt openwrt |
Wed, 22 Oct 2025 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 22 Oct 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | OpenWrt Project is a Linux operating system targeting embedded devices. Prior to version 24.10.4, ubusd contains a heap buffer overflow in the event registration parsing code. This allows an attacker to modify the head and potentially execute arbitrary code in the context of the ubus daemon. The affected code is executed before running the ACL checks, all ubus clients are able to send such messages. In addition to the heap corruption, the crafted subscription also results in a bypass of the listen ACL. This is fixed in OpenWrt 24.10.4. There are no workarounds. | |
| Title | OpenWrt ubusd vulnerable to heap buffer overflow | |
| Weaknesses | CWE-122 | |
| References |
|
|
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: GitHub_M
Published: 2025-10-22T14:59:43.577Z
Updated: 2025-10-22T15:55:03.299Z
Reserved: 2025-10-15T15:03:28.135Z
Link: CVE-2025-62526
Updated: 2025-10-22T15:54:57.448Z
Status : Awaiting Analysis
Published: 2025-10-22T15:16:07.177
Modified: 2025-10-22T21:12:32.330
Link: CVE-2025-62526
No data.