Description
PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the BST telemetry probe writes a string terminator using a device-provided length without bounds. A malicious BST device can report an oversized dev_name_len, causing a stack overflow in the driver and crashing the task (or enabling code execution). This vulnerability is fixed in 1.17.0-rc2.
Published: 2026-03-13
Score: 6.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Stack Buffer Overflow (potential code execution)
Action: Upgrade ASAP
AI Analysis

Impact

PX4 Autopilot, a flight control solution for drones, contains a stack-based buffer overflow in the BST telemetry probe. Prior to version 1.17.0‑rc2, the driver writes a string terminator using a device‑provided length without bounds. A malicious BST device that supplies an oversized dev_name_len can trigger a stack overflow, causing the task to crash or potentially enabling arbitrary code execution. This weakness is classified as CWE‑121 and is mitigated in 1.17.0‑rc2.

Affected Systems

Devices running PX4 Autopilot versions earlier than 1.17.0‑rc2 are affected. This includes the 1.17.0‑alpha1, beta1, and rc1 releases as indicated by the CPEs. Any deployment of these releases that accepts BST telemetry from untrusted devices is vulnerable. Upgrading to 1.17.0‑rc2 or later resolves the issue.

Risk and Exploitability

The CVSS score of 6.8 reflects a moderate to high severity, while an EPSS score of less than 1% indicates a low likelihood of exploitation in the wild. The vulnerability is not listed in the CISA KEV catalog, suggesting no confirmed exploitation yet. The attack vector, based on the description that a BST device can supply an oversized length, is inferred to be local device access or a device that can communicate with the autopilot. Due to the nature of the overflow, a successful exploit could lead to denial of service or remote code execution if the attacker can influence the device name field.

Generated by OpenCVE AI on March 16, 2026 at 23:04 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade PX4 Autopilot to version 1.17.0-rc2 or later
  • If upgrade is not possible, restrict or disable BST telemetry from untrusted devices
  • Verify that no malicious BST devices are connected

Generated by OpenCVE AI on March 16, 2026 at 23:04 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 17 Mar 2026 16:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 20:15:00 +0000

Type Values Removed Values Added
First Time appeared Dronecode
Dronecode px4 Drone Autopilot
CPEs cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:beta1:*:*:*:*:*:*
cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:rc1:*:*:*:*:*:*
Vendors & Products Dronecode
Dronecode px4 Drone Autopilot

Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Px4
Px4 px4-autopilot
Vendors & Products Px4
Px4 px4-autopilot

Fri, 13 Mar 2026 21:30:00 +0000

Type Values Removed Values Added
Description PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the BST telemetry probe writes a string terminator using a device-provided length without bounds. A malicious BST device can report an oversized dev_name_len, causing a stack overflow in the driver and crashing the task (or enabling code execution). This vulnerability is fixed in 1.17.0-rc2.
Title PX4 autopilot BST Device Name Length Can Overflow Driver Buffer
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 6.8, 'vector': 'CVSS:3.1/AV:P/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Dronecode Px4 Drone Autopilot
Px4 Px4-autopilot
cve-icon MITRE

Status: PUBLISHED

Assigner: GitHub_M

Published:

Updated: 2026-03-17T16:03:00.531Z

Reserved: 2026-03-13T14:33:42.823Z

Link: CVE-2026-32705

cve-icon Vulnrichment

Updated: 2026-03-17T16:02:51.372Z

cve-icon NVD

Status : Modified

Published: 2026-03-16T14:19:41.403

Modified: 2026-03-17T17:16:15.363

Link: CVE-2026-32705

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-03-23T13:39:23Z

Weaknesses