Home

Description

TinyOS versions up to and including 2.1.2 contain a global buffer overflow vulnerability in the printfUART formatted output implementation used within the ZigBee / IEEE 802.15.4 networking stack. The implementation formats output into a fixed-size global buffer and concatenates strings for %s format specifiers using strcat() without verifying remaining buffer capacity. When printfUART is invoked with a caller-controlled string longer than the available space, the unbounded sprintf/strcat sequence writes past the end of debugbuf, resulting in global memory corruption. This can cause denial of service, unintended behavior, or information disclosure via corrupted adjacent global state or UART output.

PUBLISHED Reserved 2026-01-06 | Published 2026-01-14 | Updated 2026-01-14 | Assigner VulnCheck




MEDIUM: 5.1CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-787 Out-of-bounds Write

Product status

Default status
unknown

Any version
affected

Credits

Ron Edgerson finder

References

seclists.org/fulldisclosure/2026/Jan/14 technical-description exploit

github.com/tinyos/tinyos-main product

www.vulncheck.com/...os-global-buffer-overflow-in-printfuart third-party-advisory

cve.org (CVE-2026-22211)

nvd.nist.gov (CVE-2026-22211)

Download JSON