Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22213: CWE-121 Stack-based Buffer Overflow in RIOT RIOT OS

0
Low
VulnerabilityCVE-2026-22213cvecve-2026-22213cwe-121
Published: Mon Jan 12 2026 (01/12/2026, 23:03:05 UTC)
Source: CVE Database V5
Vendor/Project: RIOT
Product: RIOT OS

Description

RIOT OS versions up to and including 2026.01-devel-317 contain a stack-based buffer overflow vulnerability in the tapslip6 utility. The vulnerability is caused by unsafe string concatenation in the devopen() function, which constructs a device path using unbounded user-controlled input. The utility uses strcpy() and strcat() to concatenate the fixed prefix '/dev/' with a user-supplied device name provided via the -s command-line option without bounds checking. This allows an attacker to supply an excessively long device name and overflow a fixed-size stack buffer, leading to process crashes and memory corruption.

AI-Powered Analysis

AILast updated: 01/12/2026, 23:38:55 UTC

Technical Analysis

CVE-2026-22213 is a stack-based buffer overflow vulnerability identified in the tapslip6 utility of RIOT OS, an operating system designed for Internet of Things (IoT) devices. The vulnerability stems from the devopen() function, which constructs a device path by concatenating a fixed prefix '/dev/' with a user-supplied device name provided through the -s command-line option. This concatenation is performed using unsafe functions strcpy() and strcat() without any bounds checking, allowing an attacker to supply an excessively long device name string. This leads to a stack buffer overflow, which can cause process crashes and memory corruption. The vulnerability requires the attacker to have local privileges to execute the tapslip6 utility and to provide crafted input, implying user interaction is necessary. The CVSS 4.0 vector indicates low attack vector (local), low complexity, no privileges required beyond local, user interaction needed, and low impact on confidentiality, integrity, and availability. No patches or exploits are currently known, but the issue is publicly disclosed and should be addressed in future RIOT OS releases.

Potential Impact

For European organizations, the impact of this vulnerability is generally low due to the limited scope and conditions required for exploitation. RIOT OS is primarily used in IoT and embedded systems, often in constrained environments. A successful exploit could cause denial of service through process crashes or potentially memory corruption, which might be leveraged for further attacks if combined with other vulnerabilities. However, the need for local access and user interaction reduces the risk of remote exploitation. Organizations deploying RIOT OS in critical infrastructure or industrial IoT devices should consider the potential for disruption or device malfunction. The vulnerability does not directly compromise confidentiality or integrity but could affect availability of affected components. Given the low CVSS score and no known exploits, the immediate threat level is low but should not be ignored in security assessments of IoT deployments.

Mitigation Recommendations

To mitigate this vulnerability, organizations should monitor for updates from the RIOT OS project and apply patches once available. In the interim, restrict access to devices running RIOT OS and limit user permissions to prevent unauthorized execution of the tapslip6 utility. Implement strict input validation or sanitization on any user-supplied device names if custom modifications are possible. Employ runtime protections such as stack canaries or address space layout randomization (ASLR) where supported by the platform to reduce exploitation risk. Conduct regular security audits of IoT devices and isolate them within segmented network zones to minimize impact if exploitation occurs. Additionally, educate users and administrators about the risks of executing untrusted commands or utilities locally on IoT devices.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-06T16:47:17.187Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69658281da2266e838450d28

Added to database: 1/12/2026, 11:23:45 PM

Last enriched: 1/12/2026, 11:38:55 PM

Last updated: 1/13/2026, 1:28:35 AM

Views: 6

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats