CVE-2025-50681: n/a
igmpproxy 0.4 before commit 2b30c36 allows remote attackers to cause a denial of service (application crash) via a crafted IGMPv3 membership report packet with a malicious source address. Due to insufficient validation in the `recv_igmp()` function in src/igmpproxy.c, an invalid group record type can trigger a NULL pointer dereference when logging the address using `inet_fmtsrc()`. This vulnerability can be exploited by sending malformed multicast traffic to a host running igmpproxy, leading to a crash. igmpproxy is used in various embedded networking environments and consumer-grade IoT devices (such as home routers and media gateways) to handle multicast traffic for IPTV and other streaming services. Affected devices that rely on unpatched versions of igmpproxy may be vulnerable to remote denial-of-service attacks across a LAN .
AI Analysis
Technical Summary
CVE-2025-50681 is a remote denial-of-service vulnerability found in igmpproxy versions before commit 2b30c36. The root cause lies in the recv_igmp() function within src/igmpproxy.c, where insufficient validation of IGMPv3 membership report packets allows an attacker to send malformed multicast traffic containing an invalid group record type. When igmpproxy attempts to log the source address using inet_fmtsrc(), this invalid input causes a NULL pointer dereference, resulting in an application crash. Igmpproxy is widely deployed in embedded networking environments and consumer-grade IoT devices, including home routers and media gateways, which handle multicast traffic for IPTV and streaming services. The vulnerability can be exploited remotely over a local area network without requiring authentication or user interaction, making it accessible to attackers with network access. Although no public exploits have been reported, the flaw poses a significant risk of service disruption, particularly in environments relying heavily on multicast traffic. The lack of a CVSS score necessitates an independent severity assessment, considering the impact on availability and the ease of triggering the crash. This vulnerability could lead to denial of service conditions, interrupting multicast streaming and potentially affecting network stability in consumer and enterprise settings.
Potential Impact
For European organizations, this vulnerability poses a risk of denial-of-service attacks that can disrupt multicast-based services such as IPTV and other streaming applications commonly used in corporate and residential networks. Service providers and enterprises relying on igmpproxy-enabled devices may experience network outages or degraded quality of service, impacting business continuity and user experience. In critical infrastructure or media distribution networks, such disruptions could lead to financial losses and reputational damage. The attack requires only local network access, which could be achieved by malicious insiders or compromised devices within the LAN, increasing the threat surface. Additionally, IoT devices with limited security controls may be easier to compromise or misuse as attack vectors. The overall impact includes reduced availability of multicast services and potential cascading effects on dependent applications and services.
Mitigation Recommendations
Organizations should prioritize updating igmpproxy to the fixed version that includes the commit 2b30c36 or later, which addresses the input validation flaw. Where direct updates to igmpproxy are not feasible, applying vendor-supplied firmware updates for affected routers and media gateways is critical. Network administrators should implement network segmentation and strict access controls to limit exposure of multicast traffic to trusted devices only. Monitoring multicast traffic for anomalous or malformed IGMPv3 packets can help detect exploitation attempts. Employing intrusion detection systems (IDS) with signatures targeting malformed IGMP packets may provide early warning. Additionally, disabling unnecessary multicast services or IGMP proxying on devices where multicast is not required can reduce the attack surface. Regular vulnerability scanning and asset inventory to identify devices running vulnerable igmpproxy versions will aid in targeted remediation efforts.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden
CVE-2025-50681: n/a
Description
igmpproxy 0.4 before commit 2b30c36 allows remote attackers to cause a denial of service (application crash) via a crafted IGMPv3 membership report packet with a malicious source address. Due to insufficient validation in the `recv_igmp()` function in src/igmpproxy.c, an invalid group record type can trigger a NULL pointer dereference when logging the address using `inet_fmtsrc()`. This vulnerability can be exploited by sending malformed multicast traffic to a host running igmpproxy, leading to a crash. igmpproxy is used in various embedded networking environments and consumer-grade IoT devices (such as home routers and media gateways) to handle multicast traffic for IPTV and other streaming services. Affected devices that rely on unpatched versions of igmpproxy may be vulnerable to remote denial-of-service attacks across a LAN .
AI-Powered Analysis
Technical Analysis
CVE-2025-50681 is a remote denial-of-service vulnerability found in igmpproxy versions before commit 2b30c36. The root cause lies in the recv_igmp() function within src/igmpproxy.c, where insufficient validation of IGMPv3 membership report packets allows an attacker to send malformed multicast traffic containing an invalid group record type. When igmpproxy attempts to log the source address using inet_fmtsrc(), this invalid input causes a NULL pointer dereference, resulting in an application crash. Igmpproxy is widely deployed in embedded networking environments and consumer-grade IoT devices, including home routers and media gateways, which handle multicast traffic for IPTV and streaming services. The vulnerability can be exploited remotely over a local area network without requiring authentication or user interaction, making it accessible to attackers with network access. Although no public exploits have been reported, the flaw poses a significant risk of service disruption, particularly in environments relying heavily on multicast traffic. The lack of a CVSS score necessitates an independent severity assessment, considering the impact on availability and the ease of triggering the crash. This vulnerability could lead to denial of service conditions, interrupting multicast streaming and potentially affecting network stability in consumer and enterprise settings.
Potential Impact
For European organizations, this vulnerability poses a risk of denial-of-service attacks that can disrupt multicast-based services such as IPTV and other streaming applications commonly used in corporate and residential networks. Service providers and enterprises relying on igmpproxy-enabled devices may experience network outages or degraded quality of service, impacting business continuity and user experience. In critical infrastructure or media distribution networks, such disruptions could lead to financial losses and reputational damage. The attack requires only local network access, which could be achieved by malicious insiders or compromised devices within the LAN, increasing the threat surface. Additionally, IoT devices with limited security controls may be easier to compromise or misuse as attack vectors. The overall impact includes reduced availability of multicast services and potential cascading effects on dependent applications and services.
Mitigation Recommendations
Organizations should prioritize updating igmpproxy to the fixed version that includes the commit 2b30c36 or later, which addresses the input validation flaw. Where direct updates to igmpproxy are not feasible, applying vendor-supplied firmware updates for affected routers and media gateways is critical. Network administrators should implement network segmentation and strict access controls to limit exposure of multicast traffic to trusted devices only. Monitoring multicast traffic for anomalous or malformed IGMPv3 packets can help detect exploitation attempts. Employing intrusion detection systems (IDS) with signatures targeting malformed IGMP packets may provide early warning. Additionally, disabling unnecessary multicast services or IGMP proxying on devices where multicast is not required can reduce the attack surface. Regular vulnerability scanning and asset inventory to identify devices running vulnerable igmpproxy versions will aid in targeted remediation efforts.
Affected Countries
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- mitre
- Date Reserved
- 2025-06-16T00:00:00.000Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 69456762a90e3c9a1540c4a9
Added to database: 12/19/2025, 2:55:30 PM
Last enriched: 12/19/2025, 3:11:07 PM
Last updated: 12/19/2025, 5:16:11 PM
Views: 7
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2025-63665: n/a
UnknownCVE-2025-14957: NULL Pointer Dereference in WebAssembly Binaryen
MediumCVE-2025-68477: CWE-918: Server-Side Request Forgery (SSRF) in langflow-ai langflow
HighCVE-2025-68457: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in boscop-fr orejime
LowCVE-2025-14809: CWE-1021 Improper Restriction of Rendered UI Layers or Frames in The Browser Company of New York ArcSearch
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.