Home

Description

arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices.

PUBLISHED Reserved 2026-02-27 | Published 2026-03-15 | Updated 2026-03-16 | Assigner VulnCheck




HIGH: 8.7CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N
HIGH: 8.8CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Problem types

Heap-based Buffer Overflow

Product status

Any version before 1.2.1
affected

Credits

Maxime ROSSI BELLOM finder

References

src.tuya.com/announcement/32 (Tuya SRC Security Advisory) vendor-advisory

github.com/tuya/arduino-TuyaOpen (arduino-TuyaOpen GitHub Repository) product

www.vulncheck.com/...d-buffer-overflow-remote-code-execution (VulnCheck Advisory: arduino-TuyaOpen DnsServer Heap-Based Buffer Overflow Remote Code Execution) third-party-advisory

cve.org (CVE-2026-28519)

nvd.nist.gov (CVE-2026-28519)

Download JSON