Vulnerability Description
miniupnpd contains an integer underflow vulnerability in SOAPAction header parsing that allows remote attackers to cause a denial of service or information disclosure by sending a malformed SOAPAction header with a single quote. Attackers can trigger an out-of-bounds memory read by exploiting improper length validation in ParseHttpHeaders(), where the parsed length underflows to a large unsigned value when passed to memchr(), causing the process to scan memory far beyond the allocated HTTP request buffer.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Miniupnp Project | Miniupnpd | < 2.3.10 |
Related Weaknesses (CWE)
References
- https://github.com/miniupnp/miniupnp/Product
- https://github.com/miniupnp/miniupnp/commit/f56bd09b2f2650126b832c5f30a65a09e281Patch
- https://www.vulncheck.com/advisories/miniupnpd-integer-underflow-soapaction-headThird Party AdvisoryVDB Entry
FAQ
What is CVE-2026-5720?
CVE-2026-5720 is a vulnerability with a CVSS score of 9.1 (CRITICAL). miniupnpd contains an integer underflow vulnerability in SOAPAction header parsing that allows remote attackers to cause a denial of service or information disclosure by sending a malformed SOAPAction...
How severe is CVE-2026-5720?
CVE-2026-5720 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2026-5720?
Check the references section above for vendor advisories and patch information. Affected products include: Miniupnp Project Miniupnpd.