A security flaw has been discovered in pymumu SmartDNS up to 47.1. This vulnerability affects the function dnsdecoderrhead/dnsdecodeSVCBHTTPS of the file src/dns.c of the component SVBC Record Parser. The manipulation results in stack-based buffer overflow. It is possible to launch the attack remotely. A high complexity level is associated with this attack. It is stated that the exploitability is difficult. The patch is identified as 2d57c4b4e1add9b4537aeb403f794a084727e1c8. Applying a patch is advised to resolve this issue.
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-1425.json"
[
{
"id": "CVE-2026-1425-26677959",
"digest": {
"line_hashes": [
"47936723472579650317540588921420773264",
"297295444819886776360825326696600298970",
"31837311719478478378871006974787145952",
"14918559670342219424111814079108165961",
"65893038981463212428264919369997831285",
"3532271727601454759440135402921217734"
],
"threshold": 0.9
},
"signature_type": "Line",
"source": "https://github.com/pymumu/smartdns/commit/2d57c4b4e1add9b4537aeb403f794a084727e1c8",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "src/dns.c"
}
},
{
"id": "CVE-2026-1425-93acf2f1",
"digest": {
"function_hash": "189241239471486783380937913167718436350",
"length": 599.0
},
"signature_type": "Function",
"source": "https://github.com/pymumu/smartdns/commit/2d57c4b4e1add9b4537aeb403f794a084727e1c8",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "src/dns.c",
"function": "_dns_decode_rr_head"
}
},
{
"id": "CVE-2026-1425-fd6ceecd",
"digest": {
"function_hash": "200354488342086936584005011630155940432",
"length": 1497.0
},
"signature_type": "Function",
"source": "https://github.com/pymumu/smartdns/commit/2d57c4b4e1add9b4537aeb403f794a084727e1c8",
"deprecated": false,
"signature_version": "v1",
"target": {
"file": "src/dns.c",
"function": "_dns_decode_SVCB_HTTPS"
}
}
]