arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices.
History

Tue, 17 Mar 2026 15:45:00 +0000

Type Values Removed Values Added
CPEs cpe:2.3:a:tuya:arduino-tuyaopen:*:*:*:*:*:*:*:*

Mon, 16 Mar 2026 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 16 Mar 2026 10:15:00 +0000

Type Values Removed Values Added
First Time appeared Tuya
Tuya arduino-tuyaopen
Vendors & Products Tuya
Tuya arduino-tuyaopen

Sun, 15 Mar 2026 14:00:00 +0000

Type Values Removed Values Added
Description arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices.
Title arduino-TuyaOpen DnsServer Heap-Based Buffer Overflow Remote Code Execution
Weaknesses CWE-122
References
Metrics cvssV3_1

{'score': 8.8, 'vector': 'CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}

cvssV4_0

{'score': 8.7, 'vector': 'CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: VulnCheck

Published: 2026-03-15T13:36:47.991Z

Updated: 2026-03-16T14:20:19.096Z

Reserved: 2026-02-27T21:07:55.466Z

Link: CVE-2026-28519

cve-icon Vulnrichment

Updated: 2026-03-16T14:17:31.261Z

cve-icon NVD

Status : Analyzed

Published: 2026-03-16T14:19:28.127

Modified: 2026-03-17T15:38:55.280

Link: CVE-2026-28519

cve-icon Redhat

No data.