CVE-2026-7426

HIGH

Out-of-Bounds Write via Unsanitized Prefix Length in Router Advertisement Processing in FreeRTOS-Plus-TCP

Title source: cna
STIX 2.1

Description

Insufficient validation of the prefix length field in IPv6 Router Advertisement processing in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to cause memory corruption by sending a crafted Router Advertisement with a prefix length value exceeding the maximum valid length, resulting in a heap buffer overflow. Users processing IPv4 RA only are not impacted. To mitigate this issue, users should upgrade to the fixed version when available.

Scores

CVSS v3 8.1
EPSS 0.0001
EPSS Percentile 3.4%
Attack Vector ADJACENT_NETWORK
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:H

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-787
Status published
Products (4)
AWS/FreeRTOS-Plus-TCP 4.0.0 - 4.2.6
AWS/FreeRTOS-Plus-TCP 4.2.6
AWS/FreeRTOS-Plus-TCP 4.3.0 - 4.4.1
AWS/FreeRTOS-Plus-TCP 4.4.1
Published Apr 29, 2026
Tracked Since Apr 30, 2026