Description
TinyOS versions up to and including 2.1.2 contain a global buffer overflow vulnerability in the printfUART formatted output implementation used within the ZigBee / IEEE 802.15.4 networking stack. The implementation formats output into a fixed-size global buffer and concatenates strings for %s format specifiers using strcat() without verifying remaining buffer capacity. When printfUART is invoked with a caller-controlled string longer than the available space, the unbounded sprintf/strcat sequence writes past the end of debugbuf, resulting in global memory corruption. This can cause denial of service, unintended behavior, or information disclosure via corrupted adjacent global state or UART output.
INFO
Published Date :
2026-01-14T15:19:54.833Z
Last Modified :
2026-01-14T15:35:01.567Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-22211 vulnerability.
| Vendors | Products |
|---|---|
| Tinyos |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-22211.