Human
Machine
REPRO-2026-00126 CRITICAL RCE
Verified
Cesanta Mongoose mDNS Stack Buffer Overflow - Remote Code Execution PoC
cesanta/mongoose (github) Apr 2, 2026
What's the vulnerability?
Stack-based buffer overflow in Cesanta Mongoose mDNS record handler (handle_mdns_record in mongoose.c) allows remote unauthenticated attackers to execute arbitrary code. The vulnerability exists in v7.20 and earlier, fixed in v7.21.
Root Cause Analysis
Variant Analysis
Bypass and alternate trigger exploration (if present).
One Command
Verify with pruva-verify
Run the Pruva CLI to automatically fetch and execute the reproduction script.
pruva-verify REPRO-2026-00126 or
pruva-verify CVE-2026-5245 Install:
curl -fsSL https://pruva.dev/install.sh | sh Or Run Manually
1
Download the script
curl -O https://pruva.dev/api/v1/reproductions/REPRO-2026-00126/artifacts/repro/reproduction_steps.sh 2
Make executable
chmod +x reproduction_steps.sh 3
Run the script
./reproduction_steps.sh Run in a VM, container, or disposable environment. This exploits a real vulnerability.
How Pruva Reproduced This
Watch the AI agent's step-by-step process.
Loading session...
Artifacts
repro/rca_report.md7.3 KBrepro/reproduction_steps.sh5.3 KBvuln_variant/rca_report.md6.7 KBvuln_variant/reproduction_steps.sh10.1 KBcoding/proposed_fix.diff3.9 KBbundle/ticket.json4.5 KBbundle/AGENTS.repro.md0.8 KBbundle/ticket.md4.0 KBrepro/runtime_manifest.json0.5 KBrepro/validation_verdict.json1.0 KBlogs/build.log0.0 KBlogs/test_vuln618.6 KBlogs/server.log3.4 KBlogs/exploit.py0.8 KBlogs/exploit.log0.3 KBvuln_variant/variant_manifest.json2.3 KBvuln_variant/variant_result.txt0.9 KBvuln_variant/runtime_manifest.json1.5 KBvuln_variant/source_identity.json0.7 KBvuln_variant/patch_analysis.md3.6 KBvuln_variant/validation_verdict.json2.1 KBvuln_variant/root_cause_equivalence.json1.5 KBrepro/quick_test.py0.5 KBlogs/variant_test619.7 KBlogs/server_variant.log0.2 KBlogs/server_fixed.log0.2 KBlogs/test_txt_variant619.0 KBlogs/build_variant.log0.0 KBlogs/build_txt_variant.log0.0 KBlogs/build_fixed.log0.0 KBlogs/exploit_fixed.log0.3 KBlogs/exploit_variants.py1.4 KBlogs/exploit_vuln.log0.2 KBlogs/server_test.log3.9 KBlogs/server_vuln.log0.0 KBlogs/exploit_variant.log0.3 KBlogs/variant_test_fixed620.2 KBlogs/exploit_txt.py1.4 KBcoding/tmp_verify/send_ptr_query.py0.8 KBcoding/tmp_verify/mdns_verify_harness.c1.2 KBcoding/tmp_verify/mdns_verify619.7 KBcoding/logs/fixed_server.log3.4 KBcoding/logs/fixed_trigger.log0.0 KBcoding/logs/build_vuln.log0.0 KBcoding/logs/build_fixed.log0.0 KBcoding/logs/vuln_trigger.log0.0 KBcoding/logs/vuln_server.log3.8 KBcoding/verify_fix.sh5.1 KBcoding/summary_report.md2.7 KB