CVE-2026-22214
Severity CVSS v4.0:
MEDIUM
Type:
CWE-121
Stack-based Buffer Overflow
Publication date:
12/01/2026
Last modified:
21/01/2026
Description
RIOT OS versions up to and including 2026.01-devel-317 contain a stack-based buffer overflow vulnerability in the ethos utility due to missing bounds checking when processing incoming serial frame data. The vulnerability occurs in the _handle_char() function, where incoming frame bytes are appended to a fixed-size stack buffer without verifying that the current write index remains within bounds. An attacker capable of sending crafted serial or TCP-framed input can cause the current write index to exceed the buffer size, resulting in a write past the end of the stack buffer. This condition leads to memory corruption and application crash.
Impact
Base Score 4.0
6.80
Severity 4.0
MEDIUM
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:* | 2025.10 (excluding) | |
| cpe:2.3:o:riot-os:riot:2026.01:devel:*:*:*:*:*:* | ||
| cpe:2.3:o:riot-os:riot:2026.01:rc1:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page



