CVE-2026-5720 PUBLISHED

miniupnpd Integer Underflow SOAPAction Header Parsing

Assigner: VulnCheck
Reserved: 06.04.2026 Published: 17.04.2026 Updated: 17.04.2026

miniupnpd contains an integer underflow vulnerability in SOAPAction header parsing that allows remote attackers to cause a denial of service or information disclosure by sending a malformed SOAPAction header with a single quote. Attackers can trigger an out-of-bounds memory read by exploiting improper length validation in ParseHttpHeaders(), where the parsed length underflows to a large unsigned value when passed to memchr(), causing the process to scan memory far beyond the allocated HTTP request buffer.

Metrics

CVSS Vector: CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:L/VI:N/VA:H/SC:N/SI:N/SA:N
CVSS Score: 7.1

Product Status

Vendor miniupnp project
Product miniupnpd
Versions Default: unknown
  • affected from 0 to 2.3.10 (excl.)

Credits

  • Kazuma Matsumoto finder

References

Problem Types

  • CWE-191: Integer Underflow (Wrap or Wraparound) CWE
  • CWE-125: Out-of-bounds Read CWE