RIOT OS versions up to and including 2026.01-devel-317...
Low severity
Unreviewed
Published
Jan 13, 2026
to the GitHub Advisory Database
•
Updated Jan 21, 2026
Description
Published by the National Vulnerability Database
Jan 12, 2026
Published to the GitHub Advisory Database
Jan 13, 2026
Last updated
Jan 21, 2026
RIOT OS versions up to and including 2026.01-devel-317 contain a stack-based buffer overflow vulnerability in the tapslip6 utility. The vulnerability is caused by unsafe string concatenation in the devopen() function, which constructs a device path using unbounded user-controlled input. The utility uses strcpy() and strcat() to concatenate the fixed prefix '/dev/' with a user-supplied device name provided via the -s command-line option without bounds checking. This allows an attacker to supply an excessively long device name and overflow a fixed-size stack buffer, leading to process crashes and memory corruption.
References