Home

Description

An improper access control vulnerability exists in Semtech LoRa LR11xxx transceivers running early versions of firmware where the memory write command accessible via the physical SPI interface fails to enforce write protection on the program call stack. An attacker with physical access to the SPI interface can overwrite stack memory to hijack program control flow and achieve limited arbitrary code execution. However, the impact is limited to the active attack session: the device's secure boot mechanism prevents persistent firmware modification, the crypto engine isolates cryptographic keys from direct firmware access, and all modifications are lost upon device reboot or loss of physical access.

PUBLISHED Reserved 2025-12-18 | Published 2026-04-07 | Updated 2026-04-07 | Assigner SWI




MEDIUM: 5.4CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/AU:N/R:A/V:D/RE:M

Problem types

CWE-123 Write-what-where Condition

Product status

Default status
unaffected

Any version before TRX FW 0x0402
affected

Default status
unaffected

Any version before TRX FW 0x0202
affected

Default status
unaffected

Any version before TRX FW 0x0104
affected

Credits

Egor (radioegor146) Koleda, https://github.com/radioegor146 finder

References

www.semtech.com/...urity/security-bulletins/sem-psa-2026-001

cve.org (CVE-2025-14857)

nvd.nist.gov (CVE-2025-14857)

Download JSON