Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Tue, 17 Mar 2026 15:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:tuya:arduino-tuyaopen:*:*:*:*:*:*:*:* |
Mon, 16 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tuya
Tuya arduino-tuyaopen |
|
| Vendors & Products |
Tuya
Tuya arduino-tuyaopen |
Sun, 15 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device. | |
| Title | arduino-TuyaOpen WiFiMulti Single-Byte Buffer Overflow Remote Code Execution | |
| Weaknesses | CWE-193 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-16T14:20:19.411Z
Reserved: 2026-02-27T21:07:55.466Z
Link: CVE-2026-28520
Updated: 2026-03-16T14:17:38.408Z
Status : Analyzed
Published: 2026-03-16T14:19:28.343
Modified: 2026-03-17T15:39:38.403
Link: CVE-2026-28520
No data.
OpenCVE Enrichment
Updated: 2026-03-23T14:01:43Z