VYPR
High severity7.5NVD Advisory· Published Apr 17, 2026· Updated Apr 17, 2026

CVE-2026-6507

CVE-2026-6507

Description

A flaw was found in dnsmasq. A remote attacker could exploit an out-of-bounds write vulnerability by sending a specially crafted BOOTREPLY (Bootstrap Protocol Reply) packet to a dnsmasq server configured with the --dhcp-split-relay option. This can lead to memory corruption, causing the dnsmasq daemon to crash and resulting in a denial of service (DoS).

AI Insight

LLM-synthesized narrative grounded in this CVE's description and references.

A remote attacker can crash dnsmasq by sending a crafted BOOTREPLY packet when the --dhcp-split-relay option is enabled, causing a denial of service.

Vulnerability

Overview

CVE-2026-6507 is an out-of-bounds write vulnerability in dnsmasq, a lightweight DNS and DHCP server. The flaw occurs during the processing of specially crafted BOOTREPLY (Bootstrap Protocol Reply) packets when the --dhcp-split-relay option is configured [1]. This option enables split-relay functionality for DHCP messages, and the improper handling of certain packet fields leads to memory corruption.

Exploitation

An attacker can exploit this vulnerability remotely without authentication by sending a malicious BOOTREPLY packet to a vulnerable dnsmasq server. The attack requires the server to have the --dhcp-split-relay option enabled, which is not a default configuration [2]. No special network position is needed beyond the ability to send UDP packets to the DHCP server port.

Impact

Successful exploitation results in memory corruption that causes the dnsmasq daemon to crash, leading to a denial of service (DoS). This disrupts DNS and DHCP services for all clients relying on the affected server. The CVSS v3 base score is 7.5 (High), reflecting the ease of remote exploitation and the potential for service interruption [1].

Mitigation

Red Hat has acknowledged the vulnerability and assigned it a medium priority. As of the publication date, a patch is not yet available; users are advised to monitor the referenced bug tracker for updates [2]. Disabling the --dhcp-split-relay option, if not required, can mitigate the risk. The vulnerability is not known to be exploited in the wild or listed in CISA's Known Exploited Vulnerabilities catalog.

AI Insight generated on May 18, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.

Affected products

1

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

2

News mentions

0

No linked articles in our index yet.