CVE-2026-24798

N/A Unknown

📋 TL;DR

This CVE describes a buffer overflow vulnerability in the miniUPnP library component of Gaijin Entertainment's DagorEngine game engine. Attackers could exploit this to execute arbitrary code or cause denial-of-service by sending specially crafted UPnP responses. This affects any application using vulnerable versions of DagorEngine that have UPnP functionality enabled.

💻 Affected Systems

Products:
  • Gaijin Entertainment DagorEngine
Versions: through dagor_2025_01_15
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where UPnP functionality is enabled in DagorEngine-based applications.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with the privileges of the DagorEngine process, potentially leading to full system compromise.

🟠

Likely Case

Application crash or denial-of-service affecting game functionality and stability.

🟢

If Mitigated

Limited impact if UPnP functionality is disabled or network access is restricted.

🌐 Internet-Facing: MEDIUM - Requires receiving malicious UPnP responses, which typically requires local network access but could be exploited via malicious game servers or mods.
🏢 Internal Only: MEDIUM - Same exploitation requirements apply regardless of network exposure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires sending malicious UPnP responses to the vulnerable component, which may require local network access or compromise of game servers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: dagor_2025_01_15 or later with the GitHub PR #136 fix applied

Vendor Advisory: https://github.com/GaijinEntertainment/DagorEngine/pull/136

Restart Required: Yes

Instructions:

1. Update to DagorEngine version after dagor_2025_01_15. 2. Ensure the fix from GitHub PR #136 is included. 3. Restart any applications using DagorEngine.

🔧 Temporary Workarounds

Disable UPnP functionality

all

Disable Universal Plug and Play features in game/application settings to prevent exploitation.

Network segmentation

all

Restrict network access to prevent malicious UPnP responses from reaching vulnerable systems.

🧯 If You Can't Patch

  • Disable UPnP functionality in all DagorEngine-based applications
  • Implement network controls to block UPnP traffic (port 1900 UDP) from untrusted sources

🔍 How to Verify

Check if Vulnerable:

Check if DagorEngine version is dagor_2025_01_15 or earlier and if UPnP functionality is enabled.

Check Version:

Check application/game documentation or configuration files for DagorEngine version information.

Verify Fix Applied:

Verify DagorEngine version is after dagor_2025_01_15 and contains the fix from GitHub PR #136 in the upnpreplyparse.c file.

📡 Detection & Monitoring

Log Indicators:

  • Application crashes with memory access violations
  • Unusual UPnP-related network activity

Network Indicators:

  • Malformed UPnP responses targeting port 1900 UDP
  • Unexpected UPnP traffic to game applications

SIEM Query:

Search for application crashes containing 'DagorEngine', 'miniupnpc', or 'UPnP' in error messages

🔗 References

📤 Share & Export