Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 21 Jan 2026 17:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:* cpe:2.3:o:riot-os:riot:2026.01:devel:*:*:*:*:*:* cpe:2.3:o:riot-os:riot:2026.01:rc1:*:*:*:*:*:* |
|
| Metrics |
cvssV3_1
|
Tue, 13 Jan 2026 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 13 Jan 2026 09:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Riot-os
Riot-os riot |
|
| Vendors & Products |
Riot-os
Riot-os riot |
Mon, 12 Jan 2026 23:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | RIOT OS versions up to and including 2026.01-devel-317 contain a stack-based buffer overflow vulnerability in the tapslip6 utility. The vulnerability is caused by unsafe string concatenation in the devopen() function, which constructs a device path using unbounded user-controlled input. The utility uses strcpy() and strcat() to concatenate the fixed prefix '/dev/' with a user-supplied device name provided via the -s command-line option without bounds checking. This allows an attacker to supply an excessively long device name and overflow a fixed-size stack buffer, leading to process crashes and memory corruption. | |
| Title | RIOT OS <= 2026.01-devel-317 Stack-Based Buffer Overflow in tapslip6 Utility | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-05-14T02:09:05.985Z
Reserved: 2026-01-06T16:47:17.187Z
Link: CVE-2026-22213
Updated: 2026-01-13T18:37:37.279Z
Status : Analyzed
Published: 2026-01-12T23:15:52.300
Modified: 2026-01-21T17:44:38.543
Link: CVE-2026-22213
No data.
OpenCVE Enrichment
Updated: 2026-04-18T07:00:11Z