Home

Description

RIOT OS versions up to and including 2026.01-devel-317 contain a stack-based buffer overflow vulnerability in the ethos utility due to missing bounds checking when processing incoming serial frame data. The vulnerability occurs in the _handle_char() function, where incoming frame bytes are appended to a fixed-size stack buffer without verifying that the current write index remains within bounds. An attacker capable of sending crafted serial or TCP-framed input can cause the current write index to exceed the buffer size, resulting in a write past the end of the stack buffer. This condition leads to memory corruption and application crash.

PUBLISHED Reserved 2026-01-06 | Published 2026-01-12 | Updated 2026-01-12 | Assigner VulnCheck




MEDIUM: 6.8CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:A/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N

Problem types

CWE-121 Stack-based Buffer Overflow

Product status

Default status
unknown

Any version
affected

Credits

Ron Edgerson finder

References

seclists.org/fulldisclosure/2026/Jan/16 technical-description exploit

www.riot-os.org/ product

github.com/RIOT-OS/RIOT product

www.vulncheck.com/...r-overflow-in-ethos-serial-frame-parser third-party-advisory

cve.org (CVE-2026-22214)

nvd.nist.gov (CVE-2026-22214)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.