Description
arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices.
Published: 2026-03-15
Score: 8.7 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

This vulnerability is a heap-based buffer overflow in the DnsServer component of the arduino‑TuyaOpen firmware. An attacker who can control the local network DNS server can send malicious DNS responses that overflow the heap buffer, potentially allowing the attacker to execute arbitrary code on the affected embedded device. The flaw results in full remote code execution, giving an attacker control over the device’s operating system or firmware.

Affected Systems

Affected products are Tuya’s arduino‑TuyaOpen firmware versions prior to 1.2.1. The vulnerability is identified by the CPE string cpe:2.3:a:tuya:arduino-tuyaopen:*:*:*:*:*:*:*:* and applies to all derivatives of this firmware that include the DnsServer component. No single affected version beyond 1.2.1 is listed, so firmware updates equal or newer than 1.2.1 are presumed safe.

Risk and Exploitability

The CVSS score of 8.7 marks this as a high‑severity flaw. The EPSS score of less than 1% indicates low current exploitation probability, but the vulnerability is not listed in CISA’s KEV catalog. Exploitation requires local network access and control of the LAN DNS server, making it a LAN‑based attack. If an attacker can reach the device from the local network and manipulate DNS traffic, they can trigger the buffer overflow and gain code execution. Until a patch is applied, the risk remains significant for devices exposed to a potentially compromised local DNS environment.

Generated by OpenCVE AI on March 17, 2026 at 16:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade to Tuya arduino‑TuyaOpen firmware version 1.2.1 or later.
  • If an upgrade is not immediately possible, isolate the device from the local DNS network or disable the DnsServer component.
  • Configure the LAN DNS server to block or rate‑limit responses to the affected device.
  • Monitor the device and network for unusual DNS traffic or signs of exploitation.

Generated by OpenCVE AI on March 17, 2026 at 16:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tuya:arduino-tuyaopen:*:*:*:*:*:*:*:*

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tuya
Tuya arduino-tuyaopen
Vendors & Products Tuya
Tuya arduino-tuyaopen

Sun, 15 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Description arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices.
Title arduino-TuyaOpen DnsServer Heap-Based Buffer Overflow Remote Code Execution
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Tuya Arduino-tuyaopen
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-16T14:20:19.096Z

Reserved: 2026-02-27T21:07:55.466Z

Link: CVE-2026-28519

cve-icon Vulnrichment

Updated: 2026-03-16T14:17:31.261Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:28.127

Modified: 2026-03-17T15:38:55.280

Link: CVE-2026-28519

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:41Z

Weaknesses