Description
arduino-TuyaOpen before version 1.2.1 contains a null pointer dereference vulnerability in the WiFiUDP component. An attacker on the same local area network can send a large volume of malicious UDP packets to cause memory exhaustion on the device, triggering a null pointer dereference and resulting in a denial-of-service condition.
Published: 2026-03-15
Score: 7.1 High
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service
Action: Update Firmware
AI Analysis

Impact

The vulnerability is a null pointer dereference in the WiFiUDP module of arduino‑TuyaOpen. An attacker on the same local area network can flood the device with a large volume of malicious UDP packets, causing memory exhaustion. The resulting null pointer dereference triggers a denial‑of‑service, making the device unavailable. The weakness is identified as CWE-476: Null Pointer Dereference. The impact is loss of availability for the affected device, potentially disrupting any services that rely on it.

Affected Systems

Devices running Tuya’s arduino‑TuyaOpen firmware before version 1.2.1 are affected. The product is identified by the CPE cpe:2.3:a:tuya:arduino-tuyaopen:*:*:*:*:*:*:*:*.

Risk and Exploitability

The CVSS score is 7.1, indicating a high severity vulnerability. The EPSS score is below 1%, suggesting a low likelihood of observed exploitation, and the vulnerability is not listed in the CISA KEV catalog. Exploitation requires local network access and the ability to send high‑volume UDP traffic to the device. The attack vector is local network; no remote code execution or data theft is described.

Generated by OpenCVE AI on March 17, 2026 at 21:23 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device firmware to version 1.2.1 or later
  • If a firmware upgrade is not immediately possible, isolate the device from the local network or block UDP traffic to the device
  • Monitor the device for abnormal UDP traffic volume and system restarts

Generated by OpenCVE AI on March 17, 2026 at 21:23 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 20:30:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tuya:arduino-tuyaopen:*:*:*:*:*:*:*:*

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tuya
Tuya arduino-tuyaopen
Vendors & Products Tuya
Tuya arduino-tuyaopen

Sun, 15 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Description arduino-TuyaOpen before version 1.2.1 contains a null pointer dereference vulnerability in the WiFiUDP component. An attacker on the same local area network can send a large volume of malicious UDP packets to cause memory exhaustion on the device, triggering a null pointer dereference and resulting in a denial-of-service condition.
Title arduino-TuyaOpen WiFiUDP Null Pointer Dereference Denial of Service
Weaknesses CWE-476
References
Metrics cvssV3_1

{'score': 6.5, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H'}

cvssV4_0

{'score': 7.1, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N'}


Subscriptions

Tuya Arduino-tuyaopen
cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-03-16T14:20:18.964Z

Reserved: 2026-02-27T21:07:55.467Z

Link: CVE-2026-28522

cve-icon Vulnrichment

Updated: 2026-03-16T14:17:28.292Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:28.760

Modified: 2026-03-17T20:27:41.187

Link: CVE-2026-28522

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T14:01:40Z

Weaknesses