PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc1, a heap-use-after-free is detected in the MavlinkShell::available() function. The issue is caused by a race condition between the MAVLink receiver thread (which handles shell creation/destruction) and the telemetry sender thread (which polls the shell for available output). The issue is remotely triggerable via MAVLink SERIAL_CONTROL messages (ID 126), which can be sent by an external ground station or automated script. This vulnerability is fixed in 1.17.0-rc1.
References
| Link | Resource |
|---|---|
| https://github.com/PX4/PX4-Autopilot/security/advisories/GHSA-j5w2-w79c-mqrw | Exploit Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2026-03-16 14:19
Updated : 2026-03-16 18:33
NVD link : CVE-2026-32724
Mitre link : CVE-2026-32724
CVE.ORG link : CVE-2026-32724
JSON object : View
Products Affected
dronecode
- px4_drone_autopilot
CWE
CWE-416
Use After Free
