### [CVE-2016-20009](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-20009) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description ** UNSUPPORTED WHEN ASSIGNED ** A DNS client stack-based buffer overflow in ipdnsc_decode_name() affects Wind River VxWorks 6.5 through 7. NOTE: This vulnerability only affects products that are no longer supported by the maintainer. ### POC #### Reference - https://blog.exodusintel.com/2016/08/09/vxworks-execute-my-packets/ #### Github No PoCs found on GitHub currently.