Home / CVE DB / CVE-2026-22211
Standard
Vulnerability Identifier

CVE-2026-22211

2026-01-14
Severity Assessment
LOW
CVSS v3.x Score
Clinical Analysis (Description)

TinyOS versions up to and including 2.1.2 contain a global buffer overflow vulnerability in the printfUART formatted output implementation used within the ZigBee / IEEE 802.15.4 networking stack. The implementation formats output into a fixed-size global buffer and concatenates strings for %s format specifiers using strcat() without verifying remaining buffer capacity. When printfUART is invoked with a caller-controlled string longer than the available space, the unbounded sprintf/strcat sequence writes past the end of debugbuf, resulting in global memory corruption. This can cause denial of service, unintended behavior, or information disclosure via corrupted adjacent global state or UART output.

Vector Sequencing

Attack Parameters

Impact Consequences

Technical Impact

Weakness Classification

CWE-CWE-787

Timeline

Time Line

PUBLICATION
14 Jan 2026
MODIFICATION
14 Jan 2026
Impact Statistics

Key Metrics

CVSS Score
LOW
Remediation Protocol

Recommended Solution

No automatic solution found. Check vendor references.
Patch Library
No direct patch listed in database.
Recommended Actions for Administrators

Immediate Action Plan

1. Inventory

Identify all affected systems in your infrastructure.

2. Assessment

Assess exposure and criticality for your organization.

3. Mitigation

Apply patches or available workarounds.

4. Verification

Test and confirm effectiveness of applied measures.