Impact
The eswifi socket offload driver in Zephyr copies user‑provided data into a fixed‑size buffer without verifying the payload length. When a payload larger than the buffer is sent, the driver writes past the end of the buffer and corrupts kernel memory. This is a classic buffer overflow (CWE‑120). Because the overwrite occurs within kernel context, a local attacker can gain unauthorized privileges, potentially leading to full kernel compromise.
Affected Systems
The flaw affects Zephyr RTOS, specifically the eswifi socket offload driver. The advisory does not list precise affected versions, so any build that includes the eswifi driver without the bounds check is vulnerable. Check the Zephyr code base or release notes for the patched version.
Risk and Exploitability
The CVSS score of 7.3 indicates high severity, while the EPSS score of less than 1% suggests low exploitation probability at present. The vulnerability is not listed in the CISA KEV catalog, and a remote attacker cannot reach the driver directly. Exploitation requires local code that can invoke the socket send API, so the attack vector is local. If an attacker can run code on the device, they can trigger the overflow and potentially achieve kernel‑level execution.
OpenCVE Enrichment