Impact
The eswifi socket offload driver copies user‑provided payloads into a fixed buffer without enforcing a length check. An oversized send request overflows the driver’s internal buffer, corrupting kernel memory and potentially allowing escalation of privileges or system instability. The vulnerability stems from a buffer overrun weakness (CWE‑120).
Affected Systems
The flaw affects the Zephyr RTOS, specifically the eswifi socket offload driver. No exact release or version information is supplied in the advisory, but all builds containing the vulnerable driver are potentially impacted.
Risk and Exploitability
The CVSS score of 7.3 marks this as a high‑severity issue, yet exploitation requires local code that can invoke the socket send API; remote attackers cannot reach this directly without additional vector. Due to the lack of EPSS data and absence from the CISA KEV catalog, the likelihood of widespread exploitation is uncertain, though the high severity means it should be addressed promptly.
OpenCVE Enrichment