SB20260424106 - Multiple vulnerabilities in OpenWrt



SB20260424106 - Multiple vulnerabilities in OpenWrt

Published: April 24, 2026

Security Bulletin ID SB20260424106
Severity
Low
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Local access
Highest impact Denial of service

Breakdown by Severity

Low 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Heap-based buffer overflow (CVE-ID: CVE-2025-62526)

The vulnerability allows a local user to execute arbitrary code.

The vulnerability exists due to heap-based buffer overflow in the event registration parsing code when parsing crafted subscription messages. A local user can send a specially crafted message to execute arbitrary code.

The affected code is reached before ACL checks, and the crafted subscription also bypasses the listen ACL.


2) Out-of-bounds read (CVE-ID: CVE-2025-62525)

The vulnerability allows a local user to read and write arbitrary kernel memory.

The vulnerability exists due to improper input validation in the ltq-ptm driver ioctls when processing ioctl requests. A local user can send crafted ioctl requests to read and write arbitrary kernel memory.

The issue affects systems using the ltq-ptm driver for DSL datapath operation in PTM mode on supported lantiq targets.


Remediation

Install update from vendor's website.