| Summary | miniupnpd contains an integer underflow vulnerability in SOAPAction header parsing that allows remote attackers to cause a denial of service or information disclosure by sending a malformed SOAPAction header with a single quote. Attackers can trigger an out-of-bounds memory read by exploiting improper length validation in ParseHttpHeaders(), where the parsed length underflows to a large unsigned value when passed to memchr(), causing the process to scan memory far beyond the allocated HTTP request buffer. |
|---|---|
| Publication Date | April 18, 2026, 7:16 a.m. |
| Registration Date | April 19, 2026, 4:08 a.m. |
| Last Update | April 18, 2026, 7:16 a.m. |