{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T07:25:00.716","vulnerabilities":[{"cve":{"id":"CVE-2026-27703","sourceIdentifier":"security-advisories@github.com","published":"2026-03-11T20:16:14.990","lastModified":"2026-03-16T20:19:49.037","vulnStatus":"Analyzed","cveTags":[],"descriptions":[{"lang":"en","value":"RIOT is an open-source microcontroller operating system, designed to match the requirements of Internet of Things (IoT) devices and other embedded devices. In 2026.01 and earlier, the default handler for the well_known_core resource coap_well_known_core_default_handler writes user-provided option data and other data into a fixed size buffer without validating the buffer is large enough to contain the response. This vulnerability allows an attacker to corrupt neighboring stack location, including security-sensitive addresses like the return address, leading to denial of service or arbitrary code execution."},{"lang":"es","value":"RIOT es un sistema operativo de microcontrolador de código abierto, diseñado para cumplir los requisitos de los dispositivos de Internet de las Cosas (IoT) y otros dispositivos embebidos. En 2026.01 y anteriores, el gestor predeterminado para el recurso well_known_core coap_well_known_core_default_handler escribe datos de opción proporcionados por el usuario y otros datos en un búfer de tamaño fijo sin validar que el búfer sea lo suficientemente grande para contener la respuesta. Esta vulnerabilidad permite a un atacante corromper ubicaciones de pila adyacentes, incluyendo direcciones sensibles a la seguridad como la dirección de retorno, lo que lleva a una denegación de servicio o a la ejecución de código arbitrario."}],"metrics":{"cvssMetricV31":[{"source":"security-advisories@github.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE"},"exploitabilityScore":3.9,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","baseScore":9.8,"baseSeverity":"CRITICAL","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":5.9}]},"weaknesses":[{"source":"security-advisories@github.com","type":"Primary","description":[{"lang":"en","value":"CWE-787"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:o:riot-os:riot:*:*:*:*:*:*:*:*","versionEndIncluding":"2026.01","matchCriteriaId":"6DACBB75-13DE-4EC2-BAB6-60C361BE10C7"}]}]}],"references":[{"url":"https://github.com/RIOT-OS/RIOT/security/advisories/GHSA-qgj4-9jff-93cj","source":"security-advisories@github.com","tags":["Exploit","Vendor Advisory"]}]}}]}