Impact
A missing bounds check in the ethos utility's _handle_char() function allows an attacker to send crafted serial or TCP‑framed input that overflows a fixed‑size stack buffer, corrupting memory and crashing the application. The available information confirms only memory corruption and program termination.
Affected Systems
RIOT:RIOT OS, versions up to and including 2026.01-devel-317, specifically the ethos utility responsible for parsing incoming serial frame data.
Risk and Exploitability
The CVSS score of 6.8 indicates moderate severity, while the EPSS score of <1% suggests a low probability of exploitation at present. The vulnerability is not listed in CISA’s KEV catalog. A likely attack requires an attacker to be able to transmit crafted frames over the device’s serial or TCP interface, which could involve remote or local access depending on deployment. If successfully exploited, the result is memory corruption and a crash, potentially leading to denial of service.
OpenCVE Enrichment