Impact
Missing bounds validation in the MQTT v5.0 property parser of FreeRTOS coreMQTT allows an MQTT broker to send a crafted packet that overflows internal buffers and crashes or restarts the client. The flaw is a classic out‑of‑bounds read/write (CWE‑125) and results in a loss of availability of the affected device.
Affected Systems
All FreeRTOS coreMQTT installations earlier than version 5.0.1, including the 5.0.0 release, are susceptible. Devices that use these versions with a broker that supports MQTT v5.0 will be impacted.
Risk and Exploitability
The CVSS score of 8.7 indicates a high severity vulnerability. No EPSS score is reported, and the issue is not listed in the CISA KEV catalog, but the attacker only needs to control a broker interface to send a malicious packet. Because the weakness resides in the client library, the supplier’s recommended remediation is to upgrade to the fixed 5.0.1 release.
OpenCVE Enrichment