Impact
The vulnerability is an integer overflow in the ESPHome API component’s protobuf decoder that allows an attacker to send a very large field_length value. The bounds check can wrap around, letting the decoder read beyond its intended buffer and ultimately crash the device. The flaw appears only when the plaintext API protocol is used, meaning the attacker does not need to authenticate. The result is a crash that denies service to the microcontroller until it is restarted, impacting availability but not confidentiality or integrity.
Affected Systems
All ESPHome device platforms are affected by this flaw. The issue exists in releases from 2025.9.0 through 2025.12.6, and it impacts hardware that runs ESPHome firmware on ESP32, ESP8266, RP2040, and LibreTiny boards.
Risk and Exploitability
The CVSS score is 1.7, indicating a low severity, and the EPSS score is less than 1%, suggesting a low probability of exploitation. The vulnerability is not listed in the CISA KEV catalogue. The attack vector is inferred to be a remote attacker sending malformed API requests over the network to the device; the plaintext API permits unauthenticated exploitation, while the encrypted API requires knowledge of the shared key. An exploit will crash the device until it is restarted, so the overall risk is modest but remediation is recommended to maintain uptime.
OpenCVE Enrichment
Github GHSA