OpenWrt Project is a Linux operating system targeting embedded devices. Prior to version 24.10.4, ubusd contains a heap buffer overflow in the event registration parsing code. This allows an attacker to modify the head and potentially execute arbitrary code in the context of the ubus daemon. The affected code is executed before running the ACL checks, all ubus clients are able to send such messages. In addition to the heap corruption, the crafted subscription also results in a bypass of the listen ACL. This is fixed in OpenWrt 24.10.4. There are no workarounds.
History

Thu, 23 Oct 2025 10:30:00 +0000

Type Values Removed Values Added
First Time appeared Linux
Linux linux
Openwrt
Openwrt openwrt
Vendors & Products Linux
Linux linux
Openwrt
Openwrt openwrt

Wed, 22 Oct 2025 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 22 Oct 2025 15:15:00 +0000

Type Values Removed Values Added
Description OpenWrt Project is a Linux operating system targeting embedded devices. Prior to version 24.10.4, ubusd contains a heap buffer overflow in the event registration parsing code. This allows an attacker to modify the head and potentially execute arbitrary code in the context of the ubus daemon. The affected code is executed before running the ACL checks, all ubus clients are able to send such messages. In addition to the heap corruption, the crafted subscription also results in a bypass of the listen ACL. This is fixed in OpenWrt 24.10.4. There are no workarounds.
Title OpenWrt ubusd vulnerable to heap buffer overflow
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 7.9, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published: 2025-10-22T14:59:43.577Z

Updated: 2025-10-22T15:55:03.299Z

Reserved: 2025-10-15T15:03:28.135Z

Link: CVE-2025-62526

cve-icon Vulnrichment

Updated: 2025-10-22T15:54:57.448Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2025-10-22T15:16:07.177

Modified: 2025-10-22T21:12:32.330

Link: CVE-2025-62526

cve-icon Redhat

No data.