Description
ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, a vulnerability exists in the WPS (Wi-Fi Protected Setup) Enrollee implementation where malformed EAP-WSC packets with truncated payloads can cause integer underflow during fragment length calculation. When processing EAP-Expanded (WSC) messages, the code computes frag_len by subtracting header sizes from the total packet length. If an attacker sends a packet where the EAP Length field covers only the header and flags but omits the expected payload (such as the 2-byte Message Length field when WPS_MSG_FLAG_LEN is set), frag_len becomes negative. This negative value is then implicitly cast to size_t when passed to wpabuf_put_data(), resulting in a very large unsigned value. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.
Published: 2026-02-04
Score: 6.3 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Integer underflow leading to unbounded memory writes that can crash the device or enable remote code execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability arises when a malicious actor sends malformed EAP‑WSC packets to the WPS Enrollee module within the Espressif IoT Development Framework. During EAP‑Expanded message processing the code calculates a fragment length by subtracting header sizes from the packet length. If the packet’s EAP Length field only accounts for the header and flag bytes and omits the expected message payload, the resulting fragment length becomes negative. That negative value is then implicitly cast to an unsigned size_t when passed to wpabuf_put_data(), which interprets it as a very large number, leading to an unbounded memory write that can corrupt the heap, crash the system, or potentially allow remote code execution. This flaw is a classic integer underflow (CWE‑191) that compromises data integrity and system stability.

Affected Systems

Affected systems are Espressif’s ESP‑IDF IoT Development Framework, specifically versions 5.1.6, 5.2.6, 5.3.4, 5.4.3, and 5.5.2. All these releases contain the vulnerable WPS Enrollee implementation. The vulnerability was fixed in the following update paths: 5.1.7, 5.2.7, 5.3.5, 5.4.4, and 5.5.3. Devices running the earlier releases and using the vulnerable code are exposed to threat from any entity able to inject crafted Wi‑Fi authentication traffic.

Risk and Exploitability

The CVSS base score of 6.3 places this issue in the medium severity range, while the EPSS value of less than 1% indicates a very low likelihood of exploitation in the wild as of the latest data. The flaw requires only the ability to transmit a malformed Wi‑Fi packet, meaning it can be launched from any local wireless network within range. No documented remote exploitation via a management interface exists, and the vulnerability is not listed in the CISA Known Exploited Vulnerabilities catalog. Consequently, the main risk is a local attacker disrupting or potentially compromising devices; administrators should apply the patched ESP‑IDF release to eliminate the risk.

Generated by OpenCVE AI on April 18, 2026 at 13:47 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade ESP‑IDF to a patched release (5.1.7, 5.2.7, 5.3.5, 5.4.4 or 5.5.3).
  • Disable WPS enrollee functionality if upgrading is not possible, or restrict the device to trusted Wi‑Fi networks.
  • Monitor system logs for anomalous EAP‑WSC traffic and configure firewall rules to block repeated malformed packets.

Generated by OpenCVE AI on April 18, 2026 at 13:47 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 20 Feb 2026 17:15:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:espressif:esp-idf:5.1.6:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.2.6:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.3.4:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.4.3:*:*:*:*:*:*:*
cpe:2.3:a:espressif:esp-idf:5.5.2:*:*:*:*:*:*:*

Thu, 05 Feb 2026 11:45:00 +0000

Type Values Removed Values Added
First Time appeared Espressif
Espressif esp-idf
Vendors & Products Espressif
Espressif esp-idf

Wed, 04 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Description ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, a vulnerability exists in the WPS (Wi-Fi Protected Setup) Enrollee implementation where malformed EAP-WSC packets with truncated payloads can cause integer underflow during fragment length calculation. When processing EAP-Expanded (WSC) messages, the code computes frag_len by subtracting header sizes from the total packet length. If an attacker sends a packet where the EAP Length field covers only the header and flags but omits the expected payload (such as the 2-byte Message Length field when WPS_MSG_FLAG_LEN is set), frag_len becomes negative. This negative value is then implicitly cast to size_t when passed to wpabuf_put_data(), resulting in a very large unsigned value. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.
Title ESF-IDF is Vulnerable to WPS Enrollee Fragment Integer Underflow
Weaknesses CWE-191
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H'}


Subscriptions

Espressif Esp-idf
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-02-04T19:24:47.749Z

Reserved: 2026-02-02T19:59:47.373Z

Link: CVE-2026-25532

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2026-02-04T18:16:09.747

Modified: 2026-02-20T17:13:48.680

Link: CVE-2026-25532

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T14:00:02Z

Weaknesses