Description
libcoap versions up to and including 4.3.5, prior to commit 30db3ea, contain a stack-based buffer overflow in address resolution when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer without proper bounds checking. A remote attacker can trigger a crash and potentially achieve remote code execution depending on compiler options and runtime memory protections. Exploitation requires the proxy logic to be enabled (i.e., the proxy request handling code path in an application using libcoap).
References (4)
Core 4
Core References
Issue Tracking issue-tracking
https://github.com/obgm/libcoap/pull/1737
Product product
https://libcoap.net/
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/libcoap-stack-based-buffer-overflow-in-address-resolution-dos-or-potential-rce
Scores
CVSS v3
9.8
EPSS
0.0042
EPSS Percentile
61.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-121
CWE-787
Status
published
Products (2)
libcoap/libcoap
< 4.3.5 (2 CPE variants)
libcoap/libcoap
30db3eaa1f0464722ebea2ca2d5084aebfbd344d
Published
Dec 31, 2025
Tracked Since
Feb 18, 2026