CVE-2026-32743: CWE-121: Stack-based Buffer Overflow in PX4 PX4-Autopilot
CVE-2026-32743 is a stack-based buffer overflow vulnerability in PX4-Autopilot versions 1. 17. 0-rc2 and earlier. The flaw exists in the MavlinkLogHandler component, where a fixed 60-byte buffer is overflowed due to unbounded sscanf parsing of file paths. An attacker with MAVLink link access can exploit this by creating deeply nested directories via MAVLink FTP and then requesting the log list, causing the flight controller's MAVLink task to crash. This results in denial of service by loss of telemetry and command capabilities. The vulnerability does not impact confidentiality or integrity but severely affects availability. No authentication or user interaction is required to trigger the issue. The vulnerability has a CVSS score of 6. 5 (medium severity) and has been fixed in a recent commit.
AI Analysis
Technical Summary
PX4 is an open-source autopilot software widely used in drones and unmanned vehicles. Versions up to 1.17.0-rc2 contain a stack-based buffer overflow vulnerability (CWE-121) in the MavlinkLogHandler module. The vulnerability arises because the LogEntry.filepath buffer is statically allocated with 60 bytes, but the sscanf function used to parse file paths from the MAVLink log list file does not limit input length. This allows an attacker with MAVLink link access to overflow the buffer by supplying a path longer than 60 characters. The exploitation requires first creating deeply nested directories via MAVLink FTP to generate long file paths, then requesting the log list to trigger the overflow. The overflow causes the flight controller's MAVLink task to crash, resulting in loss of telemetry data and command/control capabilities, effectively causing a denial of service (DoS) condition. The vulnerability does not require privileges or user interaction, making it easier to exploit if MAVLink link access is available. The issue has been addressed in a patch committed to the PX4 repository, which adds bounds checking to prevent buffer overflow. No known exploits have been reported in the wild, but the vulnerability poses a significant risk to drone operations relying on affected PX4 versions.
Potential Impact
The primary impact of this vulnerability is denial of service on affected PX4-based flight controllers. By crashing the MAVLink communication task, an attacker can disrupt telemetry and command functions, potentially causing drones or unmanned vehicles to lose control or become unresponsive. This can lead to mission failure, safety hazards, or loss of expensive equipment. Since PX4 is widely used in commercial, research, and hobbyist drones globally, organizations relying on these systems for critical operations such as surveying, delivery, inspection, or defense could face operational disruptions. The vulnerability does not compromise confidentiality or integrity, but the loss of availability in real-time control systems is critical. The ease of exploitation without authentication increases risk, especially in environments where MAVLink links are exposed or insufficiently protected. Although no known exploits exist yet, the vulnerability could be leveraged in targeted attacks or by malicious insiders with MAVLink access.
Mitigation Recommendations
Organizations should immediately upgrade PX4-Autopilot to versions later than 1.17.0-rc2 that include the patch fixing this buffer overflow. If upgrading is not immediately possible, restrict MAVLink link access to trusted and authenticated users only, ideally isolating MAVLink communication channels from untrusted networks. Implement network segmentation and firewall rules to prevent unauthorized MAVLink FTP and log requests. Monitor MAVLink traffic for unusual directory creation or log list requests that could indicate exploitation attempts. Consider applying runtime protections such as stack canaries or address space layout randomization (ASLR) if supported by the flight controller hardware and software environment. Conduct thorough testing of autopilot firmware updates in controlled environments before deployment to ensure stability and security. Finally, maintain awareness of PX4 security advisories and community updates for any emerging threats or patches.
Affected Countries
United States, China, Germany, France, Japan, South Korea, United Kingdom, Canada, Australia, India
CVE-2026-32743: CWE-121: Stack-based Buffer Overflow in PX4 PX4-Autopilot
Description
CVE-2026-32743 is a stack-based buffer overflow vulnerability in PX4-Autopilot versions 1. 17. 0-rc2 and earlier. The flaw exists in the MavlinkLogHandler component, where a fixed 60-byte buffer is overflowed due to unbounded sscanf parsing of file paths. An attacker with MAVLink link access can exploit this by creating deeply nested directories via MAVLink FTP and then requesting the log list, causing the flight controller's MAVLink task to crash. This results in denial of service by loss of telemetry and command capabilities. The vulnerability does not impact confidentiality or integrity but severely affects availability. No authentication or user interaction is required to trigger the issue. The vulnerability has a CVSS score of 6. 5 (medium severity) and has been fixed in a recent commit.
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
PX4 is an open-source autopilot software widely used in drones and unmanned vehicles. Versions up to 1.17.0-rc2 contain a stack-based buffer overflow vulnerability (CWE-121) in the MavlinkLogHandler module. The vulnerability arises because the LogEntry.filepath buffer is statically allocated with 60 bytes, but the sscanf function used to parse file paths from the MAVLink log list file does not limit input length. This allows an attacker with MAVLink link access to overflow the buffer by supplying a path longer than 60 characters. The exploitation requires first creating deeply nested directories via MAVLink FTP to generate long file paths, then requesting the log list to trigger the overflow. The overflow causes the flight controller's MAVLink task to crash, resulting in loss of telemetry data and command/control capabilities, effectively causing a denial of service (DoS) condition. The vulnerability does not require privileges or user interaction, making it easier to exploit if MAVLink link access is available. The issue has been addressed in a patch committed to the PX4 repository, which adds bounds checking to prevent buffer overflow. No known exploits have been reported in the wild, but the vulnerability poses a significant risk to drone operations relying on affected PX4 versions.
Potential Impact
The primary impact of this vulnerability is denial of service on affected PX4-based flight controllers. By crashing the MAVLink communication task, an attacker can disrupt telemetry and command functions, potentially causing drones or unmanned vehicles to lose control or become unresponsive. This can lead to mission failure, safety hazards, or loss of expensive equipment. Since PX4 is widely used in commercial, research, and hobbyist drones globally, organizations relying on these systems for critical operations such as surveying, delivery, inspection, or defense could face operational disruptions. The vulnerability does not compromise confidentiality or integrity, but the loss of availability in real-time control systems is critical. The ease of exploitation without authentication increases risk, especially in environments where MAVLink links are exposed or insufficiently protected. Although no known exploits exist yet, the vulnerability could be leveraged in targeted attacks or by malicious insiders with MAVLink access.
Mitigation Recommendations
Organizations should immediately upgrade PX4-Autopilot to versions later than 1.17.0-rc2 that include the patch fixing this buffer overflow. If upgrading is not immediately possible, restrict MAVLink link access to trusted and authenticated users only, ideally isolating MAVLink communication channels from untrusted networks. Implement network segmentation and firewall rules to prevent unauthorized MAVLink FTP and log requests. Monitor MAVLink traffic for unusual directory creation or log list requests that could indicate exploitation attempts. Consider applying runtime protections such as stack canaries or address space layout randomization (ASLR) if supported by the flight controller hardware and software environment. Conduct thorough testing of autopilot firmware updates in controlled environments before deployment to ensure stability and security. Finally, maintain awareness of PX4 security advisories and community updates for any emerging threats or patches.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- GitHub_M
- Date Reserved
- 2026-03-13T15:02:00.629Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69bb389a771bdb1749cfdbf8
Added to database: 3/18/2026, 11:43:22 PM
Last enriched: 3/26/2026, 1:12:50 AM
Last updated: 5/2/2026, 7:37:39 AM
Views: 115
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.