Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-23747: CWE-121 Stack-based Buffer Overflow in Golioth Firmware SDK

0
Medium
VulnerabilityCVE-2026-23747cvecve-2026-23747cwe-121
Published: Thu Feb 26 2026 (02/26/2026, 17:30:13 UTC)
Source: CVE Database V5
Vendor/Project: Golioth
Product: Firmware SDK

Description

Golioth Firmware SDK version 0.10.0 prior to 0.22.0, fixed in commit 48f521b, contain a stack-based buffer overflow in Payload Utils. The golioth_payload_as_int() and golioth_payload_as_float() helpers copy network-supplied payload data into fixed-size stack buffers using memcpy() with a length derived from payload_size. The only length checks are guarded by assert(); in release builds, the asserts are compiled out and memcpy() may copy an unbounded payload_size. Payloads larger than 12 bytes (int) or 32 bytes (float) can overflow the stack, resulting in a crash/denial of service. This is reachable via LightDB State on_payload with a malicious server or MITM.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/24/2026, 00:35:56 UTC

Technical Analysis

CVE-2026-23747 is a stack-based buffer overflow vulnerability identified in the Golioth Firmware SDK, specifically in versions prior to 0.22.0, with version 0.10.0 confirmed affected. The flaw exists in the Payload Utils helper functions golioth_payload_as_int() and golioth_payload_as_float(), which handle conversion of network-received payload data into integer and float types, respectively. These functions use memcpy() to copy payload data into fixed-size stack buffers (12 bytes for int, 32 bytes for float) based on the payload_size parameter. However, the only length checks are implemented as assert() statements, which are removed in release builds, allowing memcpy() to copy an unbounded amount of data if the payload_size exceeds buffer limits. This leads to a classic stack-based buffer overflow, which can corrupt the stack, cause application crashes, or potentially enable denial of service. The vulnerability is reachable remotely via the LightDB State on_payload interface, meaning an attacker controlling the server or performing a man-in-the-middle attack can send malicious payloads to trigger the overflow. The CVSS 4.0 score of 6.3 indicates a medium severity with network attack vector, low attack complexity, no privileges required, no user interaction, and limited impact on availability. No public exploits have been reported yet, but the vulnerability is fixed in commit 48f521b and versions 0.22.0 and later. This vulnerability highlights the risks of relying on assert-based validation for security-critical length checks in production code, especially in IoT firmware SDKs where remote payloads are common.

Potential Impact

The primary impact of this vulnerability is denial of service through application crashes caused by stack corruption. In environments where Golioth Firmware SDK is used, typically IoT devices and embedded systems, this can lead to device unavailability or reboot loops, disrupting critical operations. Although the current known impact is limited to DoS, stack-based buffer overflows can sometimes be leveraged for arbitrary code execution or privilege escalation, depending on the device architecture and exploit complexity. Given that the vulnerability is remotely exploitable without authentication or user interaction, attackers can disrupt large numbers of devices by sending crafted payloads via the network. This can affect IoT deployments relying on Golioth’s LightDB State service, potentially impacting industrial, smart home, or other connected device ecosystems. The lack of known exploits reduces immediate risk, but the potential for future exploitation remains. Organizations using affected SDK versions risk operational disruption, reputational damage, and increased maintenance costs if devices become unstable or compromised.

Mitigation Recommendations

Organizations should immediately upgrade all Golioth Firmware SDK instances to version 0.22.0 or later where this vulnerability is patched. Until upgrades are complete, implement strict input validation on all payload data received via LightDB State or other network interfaces to ensure payload sizes do not exceed expected limits (12 bytes for int, 32 bytes for float). Employ runtime protections such as stack canaries and address space layout randomization (ASLR) on devices to mitigate exploitation impact. Network-level controls should be used to restrict access to the LightDB State service to trusted servers and clients, minimizing exposure to malicious actors or man-in-the-middle attacks. Additionally, review and avoid using assert() for critical security checks in production firmware code; replace with explicit error handling and bounds checking. Monitor device logs and network traffic for anomalies indicating attempts to exploit this vulnerability. Finally, coordinate with Golioth support and firmware vendors to ensure timely patch deployment and vulnerability management.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
VulnCheck
Date Reserved
2026-01-15T18:42:20.937Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69a0a1c885912abc71d0baa9

Added to database: 2/26/2026, 7:40:56 PM

Last enriched: 3/24/2026, 12:35:56 AM

Last updated: 4/13/2026, 6:02:05 AM

Views: 87

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses