The host is installed with FNET through 4.6.4 and is prone to an out-of-bounds read vulnerability. A flaw is present in the application, which fails to check for a valid length of an extension header while processing the hop-by-hop header. Successful exploitation allows attackers to perform an out-of-bounds read in _fnet_ip6_ext_header_handler_options in fnet_ip6.c, leading to denial-of-service.