Description
TinyOS versions up to and including 2.1.2 contain a stack-based buffer overflow vulnerability in the mcp2200gpio utility. The vulnerability is caused by unsafe use of strcpy() and strcat() functions when constructing device paths during automatic device discovery. A local attacker can exploit this by creating specially crafted filenames under /dev/usb/, leading to stack memory corruption and application crashes.
Published: 2026-01-12
Score: 4.8 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Denial of Service via stack buffer overflow
Action: Patch Now
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 13 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'poc', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Tue, 13 Jan 2026 09:30:00 +0000

Type Values Removed Values Added
First Time appeared Tinyos
Tinyos tinyos
Vendors & Products Tinyos
Tinyos tinyos

Mon, 12 Jan 2026 23:15:00 +0000

Type Values Removed Values Added
Description TinyOS versions up to and including 2.1.2 contain a stack-based buffer overflow vulnerability in the mcp2200gpio utility. The vulnerability is caused by unsafe use of strcpy() and strcat() functions when constructing device paths during automatic device discovery. A local attacker can exploit this by creating specially crafted filenames under /dev/usb/, leading to stack memory corruption and application crashes.
Title TinyOS <= 2.1.2 Stack-Based Buffer Overflow in mcp2200gpio
Weaknesses CWE-121
References
Metrics cvssV4_0

{'score': 4.8, 'vector': 'CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published:

Updated: 2026-01-13T19:06:27.766Z

Reserved: 2026-01-06T16:47:17.187Z

Link: CVE-2026-22212

cve-icon Vulnrichment

Updated: 2026-01-13T19:06:23.122Z

cve-icon NVD

Status : Deferred

Published: 2026-01-12T23:15:52.140

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22212

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T16:30:05Z

Weaknesses