CVE-2012-5958

EXPLOITED

Libupnp < 1.6.17 - Memory Corruption

Title source: rule

Description

Stack-based buffer overflow in the unique_service_name function in ssdp/ssdp_server.c in the SSDP parser in the portable SDK for UPnP Devices (aka libupnp, formerly the Intel SDK for UPnP devices) before 1.6.18 allows remote attackers to execute arbitrary code via a UDP packet with a crafted string that is not properly handled after a certain pointer subtraction.

Exploits (4)

exploitdb WORKING POC
by Patrik Lantz · pythondoslinux
https://www.exploit-db.com/exploits/49119
nomisec SCANNER 1 stars
by lochiiconnectivity · poc
https://github.com/lochiiconnectivity/vulnupnp
exploitdb WORKING POC
rubyremoteunix
https://www.exploit-db.com/exploits/24455
metasploit WORKING POC NORMAL
by hdm · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/multi/upnp/libupnp_ssdp_overflow.rb

References (18)

Scores

EPSS 0.8862
EPSS Percentile 99.5%

Details

VulnCheck KEV 2018-07-13
CWE
CWE-119
Status published
Products (26)
libupnp_project/libupnp 1.4.0
libupnp_project/libupnp 1.4.1
libupnp_project/libupnp 1.4.2
libupnp_project/libupnp 1.4.3
libupnp_project/libupnp 1.4.4
libupnp_project/libupnp 1.4.5
libupnp_project/libupnp 1.4.6
libupnp_project/libupnp 1.4.7
libupnp_project/libupnp 1.6.0
libupnp_project/libupnp 1.6.1
... and 16 more
Published Jan 31, 2013
Tracked Since Feb 18, 2026