Wallbleed was a buffer over-read in the GFW's DNS injection subsystem that caused
middleboxes to append up to 125 bytes of their own process memory to forged DNS
responses. The bug persisted for at least two years (confirmed from October 2021);
the GFW issued an incorrect partial patch in November 2023 (Wallbleed v2 remained
exploitable) and fully patched it in March 2024. Over 5.1 billion Wallbleed responses
were collected during continuous measurement, and an IPv4-wide scan found 242 million
IP addresses across 381 autonomous systems receiving Wallbleed-injected responses —
including some traffic whose source and destination were both outside China, due to
routing through China's network border.
From 2025-fan-wallbleed — Wallbleed: A Memory Disclosure Vulnerability in the Great Firewall of China
· §1–§3, §7
· 2025
· NDSS
Implications
GFW DNS injection devices are Linux x86_64 userspace processes with ASLR enabled; they run as a fleet of middleboxes at China's network border, not as kernel modules — inform threat models accordingly.
DNS-over-HTTPS or DNS-over-TLS fully bypasses GFW DNS injection; plain UDP DNS queries to any destination IP in China will be intercepted.