arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device.
References
| Link | Resource |
|---|---|
| https://github.com/tuya/arduino-TuyaOpen | Product |
| https://src.tuya.com/announcement/32 | Vendor Advisory |
| https://www.vulncheck.com/advisories/arduino-tuyaopen-wifimulti-single-byte-buffer-overflow-remote-code-execution | Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-03-16 14:19
Updated : 2026-03-17 15:39
NVD link : CVE-2026-28520
Mitre link : CVE-2026-28520
CVE.ORG link : CVE-2026-28520
JSON object : View
Products Affected
tuya
- arduino-tuyaopen
CWE
CWE-193
Off-by-one Error
