Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2026-32708— Zenoh uORB Subscriber Allows Arbitrary Stack Allocation (PX4/PX4-Autopilot)

CVSS 7.8 · High EPSS 0.02% · P6
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2026-32708

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Zenoh uORB Subscriber Allows Arbitrary Stack Allocation (PX4/PX4-Autopilot)
Source: NVD (National Vulnerability Database)
Vulnerability Description
PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, the Zenoh uORB subscriber allocates a stack VLA directly from the incoming payload length without bounds. A remote Zenoh publisher can send an oversized fragmented message to force an unbounded stack allocation and copy, causing a stack overflow and crash of the Zenoh bridge task. This vulnerability is fixed in 1.17.0-rc2.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
栈缓冲区溢出
Source: NVD (National Vulnerability Database)
Vulnerability Title
PX4-Autopilot 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
PX4-Autopilot是PX4 Autopilot开源的一个无人机自动驾驶系统。 PX4-Autopilot 1.17.0-rc2之前版本存在安全漏洞,该漏洞源于Zenoh uORB订阅者直接从传入有效载荷长度分配栈可变长度数组时未进行边界检查,可能导致栈溢出和Zenoh桥接任务崩溃。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
PX4PX4-Autopilot < 1.17.0-rc2 -

II. Public POCs for CVE-2026-32708

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2026-32708

登录查看更多情报信息。

Same Patch Batch · PX4 · 2026-03-13 · 7 CVEs total

CVE-2026-327067.1 HIGHPX4 autopilot has a global buffer overflow in crsf_rc via oversized variable-length known
CVE-2026-327056.8 MEDIUMPX4 autopilot BST Device Name Length Can Overflow Driver Buffer
CVE-2026-327095.4 MEDIUMPX4 Autopilot MAVLink FTP Unauthenticated Path Traversal (Arbitrary File Read/Write/Delete
CVE-2026-327245.3 MEDIUMPX4 autopilot has a heap Use-After-Free in MavlinkShell::available() via SERIAL_CONTROL Ra
CVE-2026-327075.2 MEDIUMPX4 autopilot has a stack buffer overflow in tattu_can due to unbounded memcpy in frame as
CVE-2026-327134.3 MEDIUMPX4 Autopilot MAVLink FTP Session Validation Logic Error Allows Operations on Invalid File

IV. Related Vulnerabilities

V. Comments for CVE-2026-32708

No comments yet


Leave a comment