Description

TinyOS versions up to and including 2.1.2 contain a global buffer overflow vulnerability in the printfUART formatted output implementation used within the ZigBee / IEEE 802.15.4 networking stack. The implementation formats output into a fixed-size global buffer and concatenates strings for %s format specifiers using strcat() without verifying remaining buffer capacity. When printfUART is invoked with a caller-controlled string longer than the available space, the unbounded sprintf/strcat sequence writes past the end of debugbuf, resulting in global memory corruption. This can cause denial of service, unintended behavior, or information disclosure via corrupted adjacent global state or UART output.

INFO

Published Date :

2026-01-14T15:19:54.833Z

Last Modified :

2026-01-14T15:35:01.567Z

Source :

VulnCheck
AFFECTED PRODUCTS

The following products are affected by CVE-2026-22211 vulnerability.

Vendors Products
Tinyos
  • Tinyos
REFERENCES

Here, you will find a curated list of external links that provide in-depth information to CVE-2026-22211.

CVSS Vulnerability Scoring System

Detailed values of each vector for above chart.
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
VS Confidentiality
VS Integrity
VS Availability
SS Confidentiality
SS Integrity
SS Availability