CVE-2026-24798
📋 TL;DR
This CVE describes a buffer overflow vulnerability in the miniUPnP library component of Gaijin Entertainment's DagorEngine game engine. Attackers could exploit this to execute arbitrary code or cause denial-of-service by sending specially crafted UPnP responses. This affects any application using vulnerable versions of DagorEngine that have UPnP functionality enabled.
💻 Affected Systems
- Gaijin Entertainment DagorEngine
⚠️ Manual Verification Required
This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.
Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).
🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.
- Review the CVE details at NVD
- Check vendor security advisories for your specific version
- Test if the vulnerability is exploitable in your environment
- Consider updating to the latest version as a precaution
⚠️ Risk & Real-World Impact
Worst Case
Remote code execution with the privileges of the DagorEngine process, potentially leading to full system compromise.
Likely Case
Application crash or denial-of-service affecting game functionality and stability.
If Mitigated
Limited impact if UPnP functionality is disabled or network access is restricted.
🎯 Exploit Status
Exploitation requires sending malicious UPnP responses to the vulnerable component, which may require local network access or compromise of game servers.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: dagor_2025_01_15 or later with the GitHub PR #136 fix applied
Vendor Advisory: https://github.com/GaijinEntertainment/DagorEngine/pull/136
Restart Required: Yes
Instructions:
1. Update to DagorEngine version after dagor_2025_01_15. 2. Ensure the fix from GitHub PR #136 is included. 3. Restart any applications using DagorEngine.
🔧 Temporary Workarounds
Disable UPnP functionality
allDisable Universal Plug and Play features in game/application settings to prevent exploitation.
Network segmentation
allRestrict network access to prevent malicious UPnP responses from reaching vulnerable systems.
🧯 If You Can't Patch
- Disable UPnP functionality in all DagorEngine-based applications
- Implement network controls to block UPnP traffic (port 1900 UDP) from untrusted sources
🔍 How to Verify
Check if Vulnerable:
Check if DagorEngine version is dagor_2025_01_15 or earlier and if UPnP functionality is enabled.
Check Version:
Check application/game documentation or configuration files for DagorEngine version information.
Verify Fix Applied:
Verify DagorEngine version is after dagor_2025_01_15 and contains the fix from GitHub PR #136 in the upnpreplyparse.c file.
📡 Detection & Monitoring
Log Indicators:
- Application crashes with memory access violations
- Unusual UPnP-related network activity
Network Indicators:
- Malformed UPnP responses targeting port 1900 UDP
- Unexpected UPnP traffic to game applications
SIEM Query:
Search for application crashes containing 'DagorEngine', 'miniupnpc', or 'UPnP' in error messages