No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Mon, 16 Mar 2026 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Tuya
Tuya arduino-tuyaopen |
|
| Vendors & Products |
Tuya
Tuya arduino-tuyaopen |
Sun, 15 Mar 2026 14:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | arduino-TuyaOpen before version 1.2.1 contains a single-byte buffer overflow vulnerability in the WiFiMulti component. When the victim's smart hardware connects to an attacker-controlled AP hotspot, the attacker can exploit the overflow to execute arbitrary code on the affected embedded device. | |
| Title | arduino-TuyaOpen WiFiMulti Single-Byte Buffer Overflow Remote Code Execution | |
| Weaknesses | CWE-193 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: VulnCheck
Published:
Updated: 2026-03-16T14:20:19.411Z
Reserved: 2026-02-27T21:07:55.466Z
Link: CVE-2026-28520
Updated: 2026-03-16T14:17:38.408Z
Status : Awaiting Analysis
Published: 2026-03-16T14:19:28.343
Modified: 2026-03-16T14:53:07.390
Link: CVE-2026-28520
No data.
OpenCVE Enrichment
Updated: 2026-03-16T09:21:37Z