Disclosures
Arduino · ArduinoCore-avr
Stack-Based Buffer Overflow in Floating-Point to String Conversion
6.9medium
SecMateSECMATE-2025-0012
VendorArduino
ProductArduinoCore-avr
VectorCVSS:4.0/AV:L/AC:L/AT:N/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N
AdvisoryGHSA-pvx3-fm7w-6hjm
Timeline
Fixed
Feb 4, 2026
Published
Feb 4, 2026
Summary
ArduinoCore-avr contains the source code and configuration files of the Arduino AVR Boards platform. A vulnerability in versions prior to 1.8.7 allows an attacker to trigger a stack-based buffer overflow when converting floating-point values to strings with high precision. By passing very large decimalPlaces values to the affected String constructors or concat methods, the dtostrf function writes beyond fixed-size stack buffers, causing memory corruption and denial of service. Under specific conditions, this could enable arbitrary code execution on AVR-based Arduino boards.