


Perceptive Security
SOC/SIEM Consultancy

The eswifi socket offload driver copies user-provided payloads into a fixed buffer without checking available space; oversized sends overflow `eswifi->buf`, cor…
Published:
27 maart 2026 om 23:00:00
Alert date:
28 maart 2026 om 01:00:32
Source:
nvd.nist.gov
Operating Systems, Mobile & IoT
The eswifi socket offload driver in Zephyr RTOS contains a buffer overflow vulnerability (CWE-120) where user-provided payloads are copied into a fixed buffer without bounds checking. Oversized sends can overflow the eswifi->buf buffer, corrupting kernel memory. The vulnerability requires local access to exploit through the socket send API and cannot be exploited remotely. This represents a local privilege escalation or denial of service risk for systems running the affected Zephyr RTOS driver.
Technical details
Mitigation steps:
Affected products:
Zephyr RTOS
eswifi socket offload driver
Related links:
https://nvd.nist.gov/vuln/detail/CVE-2026-1679
https://github.com/zephyrproject-rtos/zephyr/security/advisories/GHSA-qx3g-5g22-fq5w
Related CVE's:
Related threat actors:
IOC's:
This article was created with the assistance of AI technology by Perceptive.
