Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32743: CWE-121: Stack-based Buffer Overflow in PX4 PX4-Autopilot

0
Medium
VulnerabilityCVE-2026-32743cvecve-2026-32743cwe-121
Published: Wed Mar 18 2026 (03/18/2026, 23:26:51 UTC)
Source: CVE Database V5
Vendor/Project: PX4
Product: PX4-Autopilot

Description

CVE-2026-32743 is a stack-based buffer overflow vulnerability in PX4-Autopilot versions 1. 17. 0-rc2 and earlier. It arises from improper bounds checking in the MavlinkLogHandler component, where a 60-byte buffer is overflowed by parsing overly long file paths without length restrictions. An attacker with MAVLink link access can exploit this by creating deeply nested directories via MAVLink FTP and then requesting the log list, causing the flight controller's MAVLink task to crash. This results in loss of telemetry and command capabilities, effectively causing a denial-of-service (DoS) condition. No authentication or user interaction is required, but network access to MAVLink is necessary. The vulnerability has a CVSS score of 6. 5 (medium severity) and has been fixed in a recent commit. There are no known exploits in the wild at this time.

AI-Powered Analysis

AILast updated: 03/18/2026, 23:57:38 UTC

Technical Analysis

PX4-Autopilot, an open-source autopilot software widely used in drones and unmanned vehicles, contains a stack-based buffer overflow vulnerability identified as CVE-2026-32743. The flaw exists in the MavlinkLogHandler module, specifically in the handling of log file paths. The LogEntry.filepath buffer is statically allocated with 60 bytes, but the sscanf function used to parse file paths from the log list does not enforce a maximum field width, allowing an attacker to supply a path longer than 60 characters. This overflow can be triggered by an attacker who has MAVLink link access by first creating deeply nested directories using MAVLink FTP, then requesting the log list via MAVLink. When the buffer overflow occurs, it corrupts the stack, causing the flight controller's MAVLink task to crash. This crash leads to a denial-of-service condition by disrupting telemetry data and command/control communication with the drone, potentially causing mission failure or loss of control. The vulnerability does not impact confidentiality or integrity directly but severely impacts availability. Exploitation requires network access to the MAVLink interface but does not require authentication or user interaction, increasing the risk in exposed environments. The issue has been addressed in a patch committed to the PX4 repository, which adds proper bounds checking to prevent buffer overflow. No public exploits have been reported yet, but the vulnerability is significant due to the critical role of PX4 in drone operations.

Potential Impact

The primary impact of this vulnerability is denial-of-service against drones or unmanned vehicles running vulnerable PX4 versions. By crashing the MAVLink task, attackers can disrupt telemetry and command channels, potentially causing loss of control or mission aborts. This can have serious safety implications, especially in commercial, industrial, or governmental drone operations where reliable control and data are critical. Organizations relying on PX4 for autonomous or remotely piloted vehicles may experience operational downtime, increased risk of accidents, or mission failures. Since MAVLink is often exposed over wireless links, attackers within communication range or with network access could exploit this vulnerability. The lack of authentication requirement for exploitation increases the threat surface. Although no confidentiality or integrity compromise is indicated, the availability impact alone can have severe consequences in sectors like agriculture, delivery, surveillance, or defense where PX4 is deployed.

Mitigation Recommendations

Organizations should immediately upgrade PX4-Autopilot to versions later than 1.17.0-rc2 where the vulnerability is patched. Until upgrades are applied, restrict network access to the MAVLink interface to trusted entities only, using network segmentation, firewalls, or VPNs to limit exposure. Disable or restrict MAVLink FTP functionality if not required to reduce attack vectors. Implement monitoring for unusual MAVLink FTP activity or log list requests that could indicate exploitation attempts. Employ runtime protections such as stack canaries or address space layout randomization (ASLR) if supported by the flight controller hardware and software environment. Conduct thorough testing of autopilot software updates in controlled environments before deployment to ensure stability. Finally, maintain awareness of PX4 security advisories and apply patches promptly to mitigate emerging threats.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T15:02:00.629Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bb389a771bdb1749cfdbf8

Added to database: 3/18/2026, 11:43:22 PM

Last enriched: 3/18/2026, 11:57:38 PM

Last updated: 3/19/2026, 1:38:42 AM

Views: 7

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses