top of page
perceptive_background_267k.jpg

The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, cor…

Published:

27 maart 2026 om 23:00:00

Alert date:

28 maart 2026 om 01:00:32

Source:

nvd.nist.gov

Click to open the original link from this advisory

Operating Systems, Mobile & IoT

The eswifi socket offload driver in Zephyr RTOS contains a buffer overflow vulnerability (CWE-120) where user-provided payloads are copied into a fixed buffer without bounds checking. Oversized sends can overflow the eswifi->buf buffer, corrupting kernel memory. The vulnerability requires local access to exploit through the socket send API and cannot be exploited remotely. This represents a local privilege escalation or denial of service risk for systems running the affected Zephyr RTOS driver.

Technical details

Mitigation steps:

Affected products:

Zephyr RTOS
eswifi socket offload driver

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page