CVE-2026-29004
HIGHBusyBox DHCPv6 Client Heap Buffer Overflow via DNS_SERVERS
Title source: cnaDescription
BusyBox before commit 42202bf contains a heap buffer overflow vulnerability in the DHCPv6 client (udhcpc6) DNS_SERVERS option handler in networking/udhcp/d6_dhcpc.c that allows network-adjacent attackers to trigger memory corruption by sending a crafted DHCPv6 response with a malformed D6_OPT_DNS_SERVERS option. Attackers can exploit incorrect heap buffer allocation calculations in the option_to_env() function to cause denial of service or achieve arbitrary code execution on embedded systems without heap hardening.
References (5)
Core 5
Core References
Product product
https://busybox.net/
Exploit technical-description
exploit
https://y637f9qq2x.com/posts/busybox-dhcpv6-heap-overflow/
Patch patch
https://github.com/vda-linux/busybox_mirror/commit/42202bfb1e6ac51fa995beda8be4d7b654aeee2a
Patch patch
https://github.com/vda-linux/busybox_mirror/commit/d368f3f7836d1c2484c8f839316e5c93e76d4409
Third Party Advisory third-party-advisory
https://www.vulncheck.com/advisories/busybox-dhcpv6-client-heap-buffer-overflow-via-dns-servers
Scores
CVSS v3
8.1
EPSS
0.0001
EPSS Percentile
1.6%
Attack Vector
ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H
CISA SSVC
Vulnrichment
Exploitation
none
Automatable
no
Technical Impact
partial
Details
CWE
CWE-122
Status
published
Products (1)
vda-linux/busybox_mirror
< 42202bfb1e6ac51fa995beda8be4d7b654aeee2a
Published
May 04, 2026
Tracked Since
May 05, 2026