Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-32743: CWE-121: Stack-based Buffer Overflow in PX4 PX4-Autopilot

0
Medium
VulnerabilityCVE-2026-32743cvecve-2026-32743cwe-121
Published: Wed Mar 18 2026 (03/18/2026, 23:26:51 UTC)
Source: CVE Database V5
Vendor/Project: PX4
Product: PX4-Autopilot

Description

CVE-2026-32743 is a stack-based buffer overflow vulnerability in PX4-Autopilot versions 1. 17. 0-rc2 and earlier. The flaw exists in the MavlinkLogHandler component, where a fixed 60-byte buffer is overflowed due to unbounded sscanf parsing of file paths. An attacker with MAVLink link access can exploit this by creating deeply nested directories via MAVLink FTP and then requesting the log list, causing the flight controller's MAVLink task to crash. This results in denial of service by loss of telemetry and command capabilities. The vulnerability does not impact confidentiality or integrity but severely affects availability. No authentication or user interaction is required to trigger the issue. The vulnerability has a CVSS score of 6. 5 (medium severity) and has been fixed in a recent commit.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/26/2026, 01:12:50 UTC

Technical Analysis

PX4 is an open-source autopilot software widely used in drones and unmanned vehicles. Versions up to 1.17.0-rc2 contain a stack-based buffer overflow vulnerability (CWE-121) in the MavlinkLogHandler module. The vulnerability arises because the LogEntry.filepath buffer is statically allocated with 60 bytes, but the sscanf function used to parse file paths from the MAVLink log list file does not limit input length. This allows an attacker with MAVLink link access to overflow the buffer by supplying a path longer than 60 characters. The exploitation requires first creating deeply nested directories via MAVLink FTP to generate long file paths, then requesting the log list to trigger the overflow. The overflow causes the flight controller's MAVLink task to crash, resulting in loss of telemetry data and command/control capabilities, effectively causing a denial of service (DoS) condition. The vulnerability does not require privileges or user interaction, making it easier to exploit if MAVLink link access is available. The issue has been addressed in a patch committed to the PX4 repository, which adds bounds checking to prevent buffer overflow. No known exploits have been reported in the wild, but the vulnerability poses a significant risk to drone operations relying on affected PX4 versions.

Potential Impact

The primary impact of this vulnerability is denial of service on affected PX4-based flight controllers. By crashing the MAVLink communication task, an attacker can disrupt telemetry and command functions, potentially causing drones or unmanned vehicles to lose control or become unresponsive. This can lead to mission failure, safety hazards, or loss of expensive equipment. Since PX4 is widely used in commercial, research, and hobbyist drones globally, organizations relying on these systems for critical operations such as surveying, delivery, inspection, or defense could face operational disruptions. The vulnerability does not compromise confidentiality or integrity, but the loss of availability in real-time control systems is critical. The ease of exploitation without authentication increases risk, especially in environments where MAVLink links are exposed or insufficiently protected. Although no known exploits exist yet, the vulnerability could be leveraged in targeted attacks or by malicious insiders with MAVLink access.

Mitigation Recommendations

Organizations should immediately upgrade PX4-Autopilot to versions later than 1.17.0-rc2 that include the patch fixing this buffer overflow. If upgrading is not immediately possible, restrict MAVLink link access to trusted and authenticated users only, ideally isolating MAVLink communication channels from untrusted networks. Implement network segmentation and firewall rules to prevent unauthorized MAVLink FTP and log requests. Monitor MAVLink traffic for unusual directory creation or log list requests that could indicate exploitation attempts. Consider applying runtime protections such as stack canaries or address space layout randomization (ASLR) if supported by the flight controller hardware and software environment. Conduct thorough testing of autopilot firmware updates in controlled environments before deployment to ensure stability and security. Finally, maintain awareness of PX4 security advisories and community updates for any emerging threats or patches.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-03-13T15:02:00.629Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69bb389a771bdb1749cfdbf8

Added to database: 3/18/2026, 11:43:22 PM

Last enriched: 3/26/2026, 1:12:50 AM

Last updated: 5/2/2026, 7:37:39 AM

Views: 115

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses