CVE-2026-28520

arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device.
Configurations

Configuration 1 (hide)

cpe:2.3:a:tuya:arduino-tuyaopen:*:*:*:*:*:*:*:*

History

17 Mar 2026, 15:39

Type Values Removed Values Added
First Time Tuya
Tuya arduino-tuyaopen
CPE cpe:2.3:a:tuya:arduino-tuyaopen:*:*:*:*:*:*:*:*
References () https://github.com/tuya/arduino-TuyaOpen - () https://github.com/tuya/arduino-TuyaOpen - Product
References () https://src.tuya.com/announcement/32 - () https://src.tuya.com/announcement/32 - Vendor Advisory
References () https://www.vulncheck.com/advisories/arduino-tuyaopen-wifimulti-single-byte-buffer-overflow-remote-code-execution - () https://www.vulncheck.com/advisories/arduino-tuyaopen-wifimulti-single-byte-buffer-overflow-remote-code-execution - Third Party Advisory

16 Mar 2026, 14:19

Type Values Removed Values Added
New CVE

Information

Published : 2026-03-16 14:19

Updated : 2026-03-17 15:39


NVD link : CVE-2026-28520

Mitre link : CVE-2026-28520

CVE.ORG link : CVE-2026-28520


JSON object : View

Products Affected

tuya

  • arduino-tuyaopen
CWE
CWE-193

Off-by-one Error