Vulnerability Description
arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Tuya | Arduino-Tuyaopen | < 1.2.1 |
Related Weaknesses (CWE)
References
- https://github.com/tuya/arduino-TuyaOpenProduct
- https://src.tuya.com/announcement/32Vendor Advisory
- https://www.vulncheck.com/advisories/arduino-tuyaopen-wifimulti-single-byte-buffThird Party Advisory
FAQ
What is CVE-2026-28520?
CVE-2026-28520 is a vulnerability with a CVSS score of 8.4 (HIGH). arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, t...
How severe is CVE-2026-28520?
CVE-2026-28520 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-28520?
Check the references section above for vendor advisories and patch information. Affected products include: Tuya Arduino-Tuyaopen.