Buffer Overflow Vulnerability in RIOT OS for IoT Devices
CVE-2026-27703

7.5HIGH

Key Information:

Vendor

Riot-os

Status
Vendor
CVE Published:
11 March 2026

What is CVE-2026-27703?

A buffer overflow vulnerability exists in RIOT, an open-source microcontroller operating system designed for IoT devices. The issue arises from the coap_well_known_core_default_handler, which improperly handles user-provided option data by writing into a fixed-size buffer without verifying its adequate capacity. This flaw can lead to the corruption of adjacent stack locations, potentially affecting critical security components, such as return addresses. Exploiting this vulnerability may result in service denial or arbitrary code execution, posing significant risks to systems relying on this software.

Human OS v1.0:
Ageing Is an Unpatched Zero-Day Vulnerability.

Remediate biological technical debt. Prime Ageing uses 95% high-purity SIRT6 activation to maintain genomic integrity and bolster systemic resilience.

Affected Version(s)

RIOT <= 2026.01

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.