๐Ÿ” CVE Alert

CVE-2026-22214

UNKNOWN 0.0

RIOT OS <= 2026.01-devel-317 Stack-Based Buffer Overflow in ethos Serial Frame Parser

CVSS Score
0.0
EPSS Score
0.1%
EPSS Percentile
21th

RIOT OS versions up to and including 2026.01-devel-317 contain a stack-based buffer overflow vulnerability in the ethos utility due to missing bounds checking when processing incoming serial frame data. The vulnerability occurs in the _handle_char() function, where incoming frame bytes are appended to a fixed-size stack buffer without verifying that the current write index remains within bounds. An attacker capable of sending crafted serial or TCP-framed input can cause the current write index to exceed the buffer size, resulting in a write past the end of the stack buffer. This condition leads to memory corruption and application crash.

CWE CWE-121
Vendor riot
Product riot os
Published Jan 12, 2026
Last Updated May 14, 2026
Stay Ahead of the Next One

Get instant alerts for riot riot os

Be the first to know when new unknown vulnerabilities affecting riot riot os are published โ€” delivered to Slack, Telegram or Discord.

Get Free Alerts โ†’ Free ยท No credit card ยท 60 sec setup

Affected Versions

RIOT / RIOT OS
0 โ‰ค 2026.01-devel-317

References

NVD โ†— CVE.org โ†— EPSS Data โ†—
seclists.org: https://seclists.org/fulldisclosure/2026/Jan/16 riot-os.org: https://www.riot-os.org/ github.com: https://github.com/RIOT-OS/RIOT vulncheck.com: https://www.vulncheck.com/advisories/riot-os-stack-based-buffer-overflow-in-ethos-serial-frame-parser

Credits

Ron Edgerson