Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer...
High severity
Unreviewed
Published
Mar 16, 2026
to the GitHub Advisory Database
•
Updated Mar 16, 2026
Description
Published by the National Vulnerability Database
Mar 16, 2026
Published to the GitHub Advisory Database
Mar 16, 2026
Last updated
Mar 16, 2026
Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the hk_hap_pair_storage_put function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the HomeKit service. Was ZDI-CAN-28326.
References