CVE-2026-23749

Golioth Firmware SDK version 0.19.1 prior to 0.22.0, fixed in commit 0e788217, contain an out-of-bounds read due to improper null termination of a blockwise transfer path. blockwise_transfer_init() accepts a path whose length equals CONFIG_GOLIOTH_COAP_MAX_PATH_LEN and copies it using strncpy() without guaranteeing a trailing NUL byte, leaving ctx->path unterminated. A later strlen() on this buffer (in golioth_coap_client_get_internal()) can read past the end of the allocation, resulting in a crash/denial of service. The input is application-controlled (not network by default).
Configurations

No configuration.

History

27 Feb 2026, 15:16

Type Values Removed Values Added
References
  • () https://blog.secmate.dev/posts/golioth-vulnerabilities-disclosure/ -

26 Feb 2026, 19:32

Type Values Removed Values Added
References
  • () https://secmate.dev/disclosures/SECMATE-2025-0017 -

26 Feb 2026, 18:23

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-26 18:23

Updated : 2026-02-27 15:16


NVD link : CVE-2026-23749

Mitre link : CVE-2026-23749

CVE.ORG link : CVE-2026-23749


JSON object : View

Products Affected

No product.

CWE
CWE-170

Improper Null Termination