High severity8.1NVD Advisory· Published Apr 29, 2026· Updated May 4, 2026
CVE-2026-7426
CVE-2026-7426
Description
Insufficient validation of the prefix length field in IPv6 Router Advertisement processing in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to cause memory corruption by sending a crafted Router Advertisement with a prefix length value exceeding the maximum valid length, resulting in a heap buffer overflow. Users processing IPv4 RA only are not impacted.
To mitigate this issue, users should upgrade to the fixed version when available.
Affected products
2- cpe:2.3:a:amazon:freertos-plus-tcp:*:*:*:*:*:*:*:*Range: >=4.0.0,<4.2.6
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4- aws.amazon.com/security/security-bulletins/2026-023-aws/nvdVendor Advisory
- github.com/FreeRTOS/FreeRTOS-Plus-TCP/security/advisories/GHSA-97qg-4359-xm3xnvdVendor AdvisoryPatch
- github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.2.6nvdRelease Notes
- github.com/FreeRTOS/FreeRTOS-Plus-TCP/releases/tag/V4.4.1nvdRelease Notes
News mentions
0No linked articles in our index yet.