Description
arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device.
Published: 2026-03-15
Score: 8.6 High
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is a single-byte buffer overflow in the WiFiMulti component of the arduino-TuyaOpen firmware before version 1.2.1. The flaw allows an attacker to overflow a local buffer and execute arbitrary code on the device, giving full control over the embedded hardware. The weakness is identified as CWE-193 and carries a high-severity CVSS score of 8.6, indicating substantial risk to device confidentiality, integrity, and availability.

Affected Systems

The affected product is arduino-TuyaOpen from Tuya. All firmware versions prior to 1.2.1 are vulnerable. No other versions are reported to be affected.

Risk and Exploitability

The CVSS score of 8.6 denotes high severity, but the EPSS score of less than 1 % suggests a low current probability of exploitation. The vulnerability is not listed in the CISA KEV catalog. Exploitation requires the target device to connect to an attacker-controlled Wi-Fi access point. When a device associates with such a hotspot, the attacker can send a specially crafted packet that triggers the buffer overflow, enabling arbitrary code execution on the compromised device.

Generated by OpenCVE AI on March 17, 2026 at 16:51 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the arduino-TuyaOpen firmware to version 1.2.1 or newer.
  • Configure devices to avoid automatic connection to unknown Wi-Fi networks or enforce network segmentation and use secure access points.
  • Monitor for unauthorized Wi-Fi hotspot activity around the device and audit network logs for anomalous connections.

Generated by OpenCVE AI on March 17, 2026 at 16:51 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tuya:arduino-tuyaopen:*:*:*:*:*:*:*:*

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tuya
Tuya arduino-tuyaopen
Vendors & Products Tuya
Tuya arduino-tuyaopen

Sun, 15 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Description arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device.
Title arduino-TuyaOpen WiFiMulti Single-Byte Buffer Overflow Remote Code Execution
Weaknesses CWE-193
References
Metrics cvssV3_1

{'score': 8.4, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.6, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Tuya Arduino-tuyaopen
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-16T14:20:19.411Z

Reserved: 2026-02-27T21:07:55.466Z

Link: CVE-2026-28520

cve-icon Vulnrichment

Updated: 2026-03-16T14:17:38.408Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:28.343

Modified: 2026-03-17T15:39:38.403

Link: CVE-2026-28520

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:43Z

Weaknesses