VulnerAlert



APPLICATION
IOT
19-12-2025 23:11

CVE-2025-50681 Vulnerabilidad documentada

Sin puntuación
Tags
#iot
#exploit
#cross
#using
#source
#home
#form
#commit
#add
#application
#vulnerability
#affected
#attackers
#vulnerable
#unpatch
#remote
#patched
#patch
#malicious
#denial
#allow
#attack
#affect
Descripción
igmpproxy 0.4 before commit 2b30c36 allows remote attackers to cause a denial of service (application crash) via crafted IGMPv3 membership report packet with malicious source address. Due insufficient validation in the `recv_igmp()` function src/igmpproxy.c, an invalid group record type can trigger NULL pointer dereference when logging address using `inet_fmtsrc()`. This vulnerability be exploited by sending malformed multicast traffic host running igmpproxy, leading crash. igmpproxy is used various embedded networking environments and consumer-grade IoT devices (such as home routers media gateways) handle for IPTV other streaming services. Affected that rely on unpatched versions may vulnerable denial-of-service attacks across LAN .
https://gist.github.com/miora-sora/dac1612d16c45c2aedb8605478adc28f
https://github.com/pali/igmpproxy/issues/97
https://github.com/younix/igmpproxy/commit/2b30c36e6ab5b21defb76ec6458ab7687984484c
https://github.com/pali/igmpproxy/issues/97
Referencia
Link externo
Ver detalles

Fuente
https://nvd.nist.gov/vuln/detail/CVE-2025-50681
Resultados similares
Coincidentes en almenos en 50% de los tags
19-12-2025 CVE-2025-14046
An improper neutralization of input vulnerability was identified in GitHub Enterprise Server th...
Ver información
19-12-2025 CVE-2025-65657
FeehiCMS version 2.1.1 has a Remote Code Execution via Unrestricted File Upload in Ad Managemen...
Ver información
Icons made by Freepik from www.flaticon.com
Este Proyecto fue cofinanciado por el Consejo Nacional de Ciencia y Tecnología (CONACYT) a través del PROINNOVA 2021/2023
Proyecto realizado por