Description
arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices.
Problem types
Product status
Credits
Maxime ROSSI BELLOM
References
src.tuya.com/announcement/32 (Tuya SRC Security Advisory)
github.com/tuya/arduino-TuyaOpen (arduino-TuyaOpen GitHub Repository)
www.vulncheck.com/...d-buffer-overflow-remote-code-execution (VulnCheck Advisory: arduino-TuyaOpen DnsServer Heap-Based Buffer Overflow Remote Code Execution)