Arduino Tuyaopen

4 CVEs product

Monthly

CVE-2026-28522 MEDIUM This Month

Arduino-TuyaOpen before version 1.2.1 contains a null pointer dereference vulnerability in its WiFiUDP component that allows unauthenticated attackers on the same local network to trigger a denial-of-service condition by flooding the device with malicious UDP packets. The vulnerability causes memory exhaustion leading to application crashes; while not actively exploited in the wild (KEV status unknown from provided data), the local network attack vector and high availability impact (CVSS 6.5) warrant prompt patching for affected IoT deployments.

Denial Of Service Null Pointer Dereference Arduino Tuyaopen
NVD GitHub VulDB
CVSS 3.1
6.5
EPSS
0.0%
CVE-2026-28519 HIGH This Week

Heap-based buffer overflow vulnerability in the DnsServer component of Tuya's arduino-TuyaOpen library (versions before 1.2.1) that allows attackers on the same LAN to execute arbitrary code on IoT/embedded devices by sending malicious DNS responses. With a CVSS score of 8.8 and tags indicating RCE capability, this represents a significant risk for connected embedded devices, though no active exploitation (not in KEV) or public PoC has been identified.

Heap Overflow RCE Buffer Overflow Arduino Tuyaopen
NVD GitHub VulDB
CVSS 3.1
8.8
EPSS
0.0%
CVE-2026-28521 HIGH This Week

CVE-2026-28521 is an out-of-bounds memory read vulnerability in the TuyaIoT component of arduino-TuyaOpen library versions prior to 1.2.1, affecting IoT devices using Tuya's cloud platform. An attacker who compromises or controls the Tuya cloud service can send malformed DP (data point) events to trigger memory disclosure or denial-of-service conditions. While rated CVSS 7.7, the exploitation requires local access according to the vector, creating some contradiction with the cloud-based attack scenario described.

Information Disclosure Buffer Overflow Arduino Tuyaopen
NVD GitHub VulDB
CVSS 3.1
7.7
EPSS
0.0%
CVE-2026-28520 HIGH This Week

Single-byte buffer overflow vulnerability in the WiFiMulti component of arduino-TuyaOpen (versions before 1.2.1) that allows remote code execution when IoT devices connect to attacker-controlled WiFi access points. This affects Tuya's Arduino library used in smart home devices, with a CVSS score of 8.4, though the local attack vector (AV:L) suggests physical proximity is required despite the remote exploitation capability described.

RCE Buffer Overflow Arduino Tuyaopen
NVD GitHub VulDB
CVSS 3.1
8.4
EPSS
0.0%
CVE-2026-28522
EPSS 0% CVSS 6.5
MEDIUM This Month

Arduino-TuyaOpen before version 1.2.1 contains a null pointer dereference vulnerability in its WiFiUDP component that allows unauthenticated attackers on the same local network to trigger a denial-of-service condition by flooding the device with malicious UDP packets. The vulnerability causes memory exhaustion leading to application crashes; while not actively exploited in the wild (KEV status unknown from provided data), the local network attack vector and high availability impact (CVSS 6.5) warrant prompt patching for affected IoT deployments.

Denial Of Service Null Pointer Dereference Arduino Tuyaopen
NVD GitHub VulDB
CVE-2026-28519
EPSS 0% CVSS 8.8
HIGH This Week

Heap-based buffer overflow vulnerability in the DnsServer component of Tuya's arduino-TuyaOpen library (versions before 1.2.1) that allows attackers on the same LAN to execute arbitrary code on IoT/embedded devices by sending malicious DNS responses. With a CVSS score of 8.8 and tags indicating RCE capability, this represents a significant risk for connected embedded devices, though no active exploitation (not in KEV) or public PoC has been identified.

Heap Overflow RCE Buffer Overflow +1
NVD GitHub VulDB
CVE-2026-28521
EPSS 0% CVSS 7.7
HIGH This Week

CVE-2026-28521 is an out-of-bounds memory read vulnerability in the TuyaIoT component of arduino-TuyaOpen library versions prior to 1.2.1, affecting IoT devices using Tuya's cloud platform. An attacker who compromises or controls the Tuya cloud service can send malformed DP (data point) events to trigger memory disclosure or denial-of-service conditions. While rated CVSS 7.7, the exploitation requires local access according to the vector, creating some contradiction with the cloud-based attack scenario described.

Information Disclosure Buffer Overflow Arduino Tuyaopen
NVD GitHub VulDB
CVE-2026-28520
EPSS 0% CVSS 8.4
HIGH This Week

Single-byte buffer overflow vulnerability in the WiFiMulti component of arduino-TuyaOpen (versions before 1.2.1) that allows remote code execution when IoT devices connect to attacker-controlled WiFi access points. This affects Tuya's Arduino library used in smart home devices, with a CVSS score of 8.4, though the local attack vector (AV:L) suggests physical proximity is required despite the remote exploitation capability described.

RCE Buffer Overflow Arduino Tuyaopen
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy