<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Busybox — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/tags/busybox/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Mon, 04 May 2026 18:16:26 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/tags/busybox/feed.xml" rel="self" type="application/rss+xml"/><item><title>BusyBox DHCPv6 Client Heap Buffer Overflow Vulnerability (CVE-2026-29004)</title><link>https://feed.craftedsignal.io/briefs/2026-05-busybox-dhcpv6-overflow/</link><pubDate>Mon, 04 May 2026 18:16:26 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-busybox-dhcpv6-overflow/</guid><description>A heap buffer overflow vulnerability in BusyBox's DHCPv6 client allows network-adjacent attackers to trigger memory corruption, denial of service, or arbitrary code execution via crafted DHCPv6 responses.</description><content:encoded><![CDATA[<p>CVE-2026-29004 is a critical heap buffer overflow vulnerability affecting BusyBox before commit 42202bf. The vulnerability resides in the DHCPv6 client (udhcpc6), specifically within the DNS_SERVERS option handler located in networking/udhcp/d6_dhcpc.c. A network-adjacent attacker can exploit this flaw by sending a malicious DHCPv6 response containing a malformed D6_OPT_DNS_SERVERS option. This manipulation leads to incorrect heap buffer allocation calculations in the option_to_env() function, causing memory corruption. Successful exploitation can result in a denial of service or, more severely, arbitrary code execution on vulnerable embedded systems lacking heap hardening. The scope of impact is potentially broad, given BusyBox&rsquo;s widespread use in embedded devices.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker identifies a target embedded system running a vulnerable version of BusyBox with the DHCPv6 client enabled.</li>
<li>The attacker crafts a malicious DHCPv6 response packet.</li>
<li>The crafted packet includes a D6_OPT_DNS_SERVERS option with a size that exceeds the expected buffer allocation.</li>
<li>The attacker transmits the crafted DHCPv6 response packet to the target system on the local network.</li>
<li>The target system&rsquo;s udhcpc6 client receives the malicious DHCPv6 response.</li>
<li>The udhcpc6 client processes the D6_OPT_DNS_SERVERS option, triggering the vulnerable option_to_env() function.</li>
<li>The option_to_env() function calculates an insufficient buffer size based on the malformed option.</li>
<li>A heap buffer overflow occurs when copying the oversized DNS server list, leading to memory corruption, denial-of-service, or arbitrary code execution.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of CVE-2026-29004 can have severe consequences. A denial-of-service condition could disrupt the functionality of the affected embedded system. More critically, arbitrary code execution allows attackers to gain complete control over the device, potentially leading to data theft, device compromise, or use in botnet activities. Given BusyBox&rsquo;s prevalence in embedded systems, a large number of devices are potentially vulnerable.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Apply the patch addressing CVE-2026-29004 by updating to a version of BusyBox after commit 42202bf.</li>
<li>Deploy the Sigma rule &ldquo;Detect Suspicious DHCPv6 DNS Server Option Size&rdquo; to identify potentially malicious DHCPv6 responses in network traffic.</li>
<li>Monitor network traffic for unusually large DHCPv6 DNS_SERVERS options as indicated by the Sigma rule and network connection logs.</li>
</ul>
]]></content:encoded><category domain="severity">critical</category><category domain="type">advisory</category><category>heap-overflow</category><category>dhcpv6</category><category>busybox</category><category>cve-2026-29004</category><category>denial-of-service</category></item></channel></rss>