CVE-2026-4893
Description
An information disclosure vulnerability in dnsmasq allows remote attackers to bypass source checks via a crafted DNS packet with RFC 7871 client subnet information.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
dnsmasq fails to validate EDNS Client Subnet source addresses, allowing remote attackers to bypass source checks and poison cache.
Vulnerability
Overview
CVE-2026-4893 is an information disclosure vulnerability in dnsmasq's handling of EDNS Client Subnet (ECS) options as defined in RFC 7871. When the --add-subnet feature is enabled, process_reply() incorrectly passes the OPT record length (approximately length (approximately 23 bytes) to check_source() instead of the full DNS packet length. This causes all internal bounds and source validation checks to fail, and check_source() consequently always returns success, effectively disabling source validation is effectively disabled [1][3].
Exploitation
Conditions
An attacker can exploit this vulnerability by sending a crafted DNS packet containing a malformed ECS option to a vulnerable dnsmasq server that has --add-subnet enabled. No authentication is required. The attacker must be able to send DNS queries to the target server and receive responses. The bug is reachable before any DNSSEC validation, meaning a valid signature is not required to trigger the validation bypass [2][3].
Impact
Successful exploitation allows a remote attacker to bypass the source address checks defined in RFC 7871§9.2 of RFC 7871. This can enable DNS cache poisoning attacks where the attacker can insert false DNS entries into the dnsmasq cache, redirecting victims to attacker-controlled IP addresses. The vulnerability is rated Medium (CVSS 5.3) with a focus on confidentiality and integrity impact through cache poisoning [1][2].
Mitigation
Status
A fix is fixed in dnsmasq version 2.92rel2, released on 11 May 2026 [2]. Patches are available from the official dnsmasq website [2]. Major distributors such as Pi-hole (FTL v6.6.2) and NixOS (release-25.11 have released updated packages [3][4]. Users are strongly advised to upgrade to the patched version or apply the vendor-supplied patches.
AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
1Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
6News mentions
4- ⚡ Weekly Recap: Exchange 0-Day, npm Worm, Fake AI Repo, Cisco Exploit and MoreThe Hacker News · May 18, 2026
- Week in review: Cisco patches SD-WAN 0-day, unpatched Microsoft Exchange Server flaw exploitedHelp Net Security · May 17, 2026
- Researchers open-source a Wi-Fi cyber range for security trainingHelp Net Security · May 13, 2026
- APT28 exploit routers to enable DNS hijacking operationsNCSC UK · Apr 7, 2026