libcoap versions up to and including 4.3.5, prior to...
High severity
Unreviewed
Published
Dec 31, 2025
to the GitHub Advisory Database
•
Updated Jan 14, 2026
Description
Published by the National Vulnerability Database
Dec 31, 2025
Published to the GitHub Advisory Database
Dec 31, 2025
Last updated
Jan 14, 2026
libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).
References