top of page
perceptive_background_267k.jpg

RIOT is an open-source microcontroller operating system, designed to match the requirements of Internet of Things (IoT) devices and other embedded devices. In 2…

Published:

10 maart 2026 om 23:00:00

Alert date:

11 maart 2026 om 21:03:26

Source:

nvd.nist.gov

Click to open the original link from this advisory

Mobile & IoT, Operating Systems

RIOT open-source microcontroller operating system for IoT devices contains a critical buffer overflow vulnerability in version 2026.01 and earlier. The vulnerability exists in the coap_well_known_core_default_handler function which writes user-provided data to a fixed-size buffer without proper validation. Attackers can exploit this flaw to corrupt stack memory, including security-sensitive addresses like return addresses. This can lead to denial of service attacks or arbitrary code execution on affected IoT devices. The vulnerability affects the well_known_core resource handler in the CoAP implementation.

Technical details

Mitigation steps:

Affected products:

RIOT OS

Related links:

Related CVE's:

Related threat actors:

IOC's:

This article was created with the assistance of AI technology by Perceptive.

© 2025 by Perceptive Security. All rights reserved.

email: info@perceptivesecurity.com

Deze website toont informatie afkomstig van externe bronnen; Perceptive aanvaardt geen verantwoordelijkheid voor de juistheid, volledigheid of actualiteit van deze informatie.

bottom of page