PatchSiren

PatchSiren cyber security CVE debrief

CVE-2026-5720 Miniupnp Project CVE debrief

CVE-2026-5720 affects miniupnpd from the Miniupnp Project. A malformed SOAPAction header containing a single quote can trigger an integer underflow in ParseHttpHeaders(), which may cause memchr() to scan beyond the allocated HTTP request buffer. The supplied NVD record lists miniupnpd versions before 2.3.10 as vulnerable and rates the issue HIGH (7.1).

Vendor
Miniupnp Project
Product
CVE-2026-5720
CVSS
HIGH 7.1
CISA KEV
Not listed in stored evidence
Original CVE published
2026-04-17
Original CVE updated
2026-05-11
Advisory published
2026-04-17
Advisory updated
2026-05-11

Who should care

Administrators and vendors running miniupnpd, especially versions before 2.3.10, should prioritize review. Security teams responsible for embedded devices, routers, and other network appliances that expose miniupnpd-backed services should also pay attention.

Technical summary

The flaw is in SOAPAction header parsing. According to the supplied description, ParseHttpHeaders() performs improper length validation, allowing a parsed length to underflow to a very large unsigned value before being passed to memchr(). That can drive an out-of-bounds memory read past the HTTP request buffer. The provided sources associate the issue with CWE-191 and CWE-125 and describe potential denial of service and information disclosure.

Defensive priority

High. Patch or upgrade first on any exposed miniupnpd deployment, and treat the issue as urgent on systems that process untrusted SOAP traffic or are difficult to monitor. Because the flaw can crash the daemon or expose memory contents, it warrants prompt remediation even though the supplied data does not indicate confirmed exploitation.

Recommended defensive actions

  • Upgrade miniupnpd to a fixed release at or beyond the version boundary indicated in the supplied CPE data; the vulnerable range ends before 2.3.10.
  • Review the referenced patch commit and any distribution or appliance guidance to confirm the exact fixed build for your environment.
  • Restrict access to miniupnpd as much as possible, especially from untrusted networks.
  • Monitor for crashes, abnormal restarts, and suspicious SOAPAction requests with malformed quoting or other parsing anomalies.
  • If upgrading is delayed, reduce exposure by tightening firewall and interface-level access to the service.

Evidence notes

The debrief is based only on the supplied NVD record, the CVE metadata, and the referenced upstream and third-party links. The NVD description explicitly names the malformed SOAPAction trigger, the integer underflow in ParseHttpHeaders(), and the resulting out-of-bounds read risk. The NVD metadata also lists miniupnpd before 2.3.10 as vulnerable, includes CWE-191 and CWE-125, and marks the record as 'Undergoing Analysis'.

Official resources

CVE published 2026-04-17 and last modified 2026-05-11. No CISA KEV entry was supplied. The provided NVD record was still marked 'Undergoing Analysis' at the time of the source snapshot.