Description
RIOT OS versions up to and including 2026.01-devel-317 contain a stack-based buffer overflow vulnerability in the ethos utility due to missing bounds checking when processing incoming serial frame data. The vulnerability occurs in the _handle_char() function, where incoming frame bytes are appended to a fixed-size stack buffer without verifying that the current write index remains within bounds. An attacker capable of sending crafted serial or TCP-framed input can cause the current write index to exceed the buffer size, resulting in a write past the end of the stack buffer. This condition leads to memory corruption and application crash.
INFO
Published Date :
2026-01-12T23:03:23.393Z
Last Modified :
2026-01-12T23:03:23.393Z
Source :
VulnCheck
AFFECTED PRODUCTS
The following products are affected by CVE-2026-22214 vulnerability.
| Vendors | Products |
|---|---|
| Riot-os |
|
REFERENCES
Here, you will find a curated list of external links that provide in-depth information to CVE-2026-22214.