Home

Description

PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, The crsf_rc parser accepts an oversized variable-length known packet and copies it into a fixed 64-byte global buffer without a bounds check. In deployments where crsf_rc is enabled on a CRSF serial port, an adjacent/raw-serial attacker can trigger memory corruption and crash PX4. This vulnerability is fixed in 1.17.0-rc2.

PUBLISHED Reserved 2026-03-13 | Published 2026-03-13 | Updated 2026-03-13 | Assigner GitHub_M




HIGH: 7.1CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H

Problem types

CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-787: Out-of-bounds Write

Product status

< 1.17.0-rc2
affected

References

github.com/...opilot/security/advisories/GHSA-mqgj-hh4g-fg5p

cve.org (CVE-2026-32706)

nvd.nist.gov (CVE-2026-32706)

Download JSON