Stack-based Buffer Overflow in libcoap Affects Open Source Networking Applications
CVE-2025-34468

8.2HIGH

Key Information:

Vendor

Libcoap

Status
Vendor
CVE Published:
31 December 2025

What is CVE-2025-34468?

A stack-based buffer overflow vulnerability exists in libcoap, specifically in the address resolution process. This flaw occurs when attacker-controlled hostname data is copied into a fixed 256-byte stack buffer, lacking proper bounds checking. As a result, a remote attacker could exploit this vulnerability to crash affected applications and, depending on compiler options and runtime memory configurations, potentially gain remote code execution. Notably, the exploitation of this vulnerability requires the proxy logic to be enabled within applications utilizing libcoap.

Affected Version(s)

libcoap 0 <= 4.3.5

libcoap 30db3eaa1f0464722ebea2ca2d5084aebfbd344d

References

CVSS V4

Score:
8.2
Severity:
HIGH
Confidentiality:
None
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Attack Required:
Physical
Privileges Required:
Undefined
User Interaction:
None

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

SecMate
.