CVE-2025-50681
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-12-19

Last updated on: 2025-12-19

Assigner: MITRE

Description
igmpproxy 0.4 before commit 2b30c36 allows remote attackers to cause a denial of service (application crash) via a crafted IGMPv3 membership report packet with a malicious source address. Due to insufficient validation in the `recv_igmp()` function in src/igmpproxy.c, an invalid group record type can trigger a NULL pointer dereference when logging the address using `inet_fmtsrc()`. This vulnerability can be exploited by sending malformed multicast traffic to a host running igmpproxy, leading to a crash. igmpproxy is used in various embedded networking environments and consumer-grade IoT devices (such as home routers and media gateways) to handle multicast traffic for IPTV and other streaming services. Affected devices that rely on unpatched versions of igmpproxy may be vulnerable to remote denial-of-service attacks across a LAN .
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-12-19
Last Modified
2025-12-19
Generated
2026-05-07
AI Q&A
2025-12-19
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
younix igmpproxy *
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-120 The product copies an input buffer to an output buffer without verifying that the size of the input buffer is less than the size of the output buffer.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-50681 is a buffer overflow vulnerability in the igmpproxy software, specifically in the igmpPacketKind function. The vulnerability occurs because the function uses an unsafe sprintf call to format attacker-controlled input parameters 'type' and 'code' into a fixed-size 20-byte buffer without proper bounds checking. When an attacker supplies large values for these parameters, the formatted string exceeds the buffer size, causing a buffer overflow. This overflow can overwrite critical memory areas like the stack canary, leading to program crashes or termination. The issue was fixed by replacing sprintf with snprintf to enforce buffer size limits. [1, 2, 3]


How can this vulnerability impact me? :

This vulnerability can be exploited remotely by sending specially crafted IGMP packets with malicious source addresses to a host running vulnerable versions of igmpproxy. Exploitation leads to a denial of service (DoS) by crashing the application due to buffer overflow and stack canary corruption. Devices affected include embedded networking environments and consumer-grade IoT devices such as home routers and media gateways that use igmpproxy to handle multicast traffic. This can disrupt IPTV and streaming services relying on multicast traffic within a LAN. [1, 2]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability can be detected by monitoring for crashes or denial-of-service symptoms on devices running vulnerable versions of igmpproxy when they receive malformed IGMPv3 membership report packets with invalid group record types. Detection could involve capturing and analyzing IGMP traffic on the network to identify malformed or suspicious IGMPv3 membership report packets. Specific commands are not provided in the resources, but using packet capture tools like tcpdump or Wireshark to filter IGMPv3 packets and inspecting for unusual or malformed group record types could help detect attempts to exploit this vulnerability. [1, 2, 3]


What immediate steps should I take to mitigate this vulnerability?

The immediate mitigation step is to update or patch igmpproxy to the fixed version that includes the commit 2b30c36, which replaces unsafe sprintf calls with snprintf to prevent buffer overflow. If updating is not immediately possible, restricting or filtering malformed IGMPv3 membership report packets on the network to prevent malicious packets from reaching vulnerable devices can help mitigate the risk. Monitoring and limiting multicast traffic from untrusted sources on the LAN is also advisable. [1]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart