CVE-2026-22214
RIOT OS <= 2026.01-devel-317 Stack-Based Buffer Overflow in ethos Serial Frame Parser
RIOT OS versions up to and including 2026.01-devel-317 contain a stack-based buffer overflow vulnerability in the ethos utility due to missing bounds checking when processing incoming serial frame data. The vulnerability occurs in the _handle_char() function, where incoming frame bytes are appended to a fixed-size stack buffer without verifying that the current write index remains within bounds. An attacker capable of sending crafted serial or TCP-framed input can cause the current write index to exceed the buffer size, resulting in a write past the end of the stack buffer. This condition leads to memory corruption and application crash.
| CWE | CWE-121 |
| Vendor | riot |
| Product | riot os |
| Published | Jan 12, 2026 |
| Last Updated | May 14, 2026 |
Get instant alerts for riot riot os
Be the first to know when new unknown vulnerabilities affecting riot riot os are published โ delivered to Slack, Telegram or Discord.