Browse all 29 CVE security advisories affecting contiki-ng. AI-powered Chinese analysis, POCs, and references for each vulnerability.
Contiki-NG is an open-source operating system designed for resource-constrained Internet of Things (IoT) devices, specifically targeting low-power wireless sensor networks and mesh networking applications. Its architecture prioritizes energy efficiency and protocol support for standards like 6LoWPAN and CoAP. Historically, the codebase has exhibited vulnerabilities typical of embedded C systems, including buffer overflows, integer overflows, and improper input validation, which can lead to remote code execution or denial of service. With twenty-nine recorded CVEs, these flaws often stem from legacy code structures and limited memory safety mechanisms inherent in its design. Notable incidents involve exploitation of network stack components, allowing attackers to disrupt connectivity or gain unauthorized access to device resources. The project’s security posture relies heavily on community-driven patches and rigorous code review, though the complexity of maintaining secure firmware for diverse hardware configurations remains a persistent challenge for developers integrating this OS into production environments.
This page lists every published CVE security advisory associated with contiki-ng. Each entry links to a detailed page with CVSS scoring, CWE classification, affected products and references. AI-generated Chinese analysis is provided for fast triage.