icon

We found results for “

CVE-2025-69209

Good to know:

icon
icon

Date: January 21, 2026

ArduinoCore-avr contains the source code and configuration files of the Arduino AVR Boards platform. A vulnerability in versions prior to 1.8.7 allows an attacker to trigger a stack-based buffer overflow when converting floating-point values to strings with high precision. By passing very large "decimalPlaces" values to the affected String constructors or concat methods, the "dtostrf" function writes beyond fixed-size stack buffers, causing memory corruption and denial of service. Under specific conditions, this could enable arbitrary code execution on AVR-based Arduino boards. Patches - The Fix is included starting from the "1.8.7" release available from the following link "ArduinoCore-avr v1.8.7" (https://github.com/arduino/ArduinoCore-avr) - The Fixing Commit is available at the following link "1a6a417f89c8901dad646efce74ae9d3ddebfd59" (https://github.com/arduino/ArduinoCore-avr/pull/613/commits/1a6a417f89c8901dad646efce74ae9d3ddebfd59) References - "ASEC-26-001 ArduinoCore-avr vXXXX Resolves Buffer Overflow Vulnerability" (https://support.arduino.cc/hc/en-us/articles/XXXXX) Credits - Maxime Rossi Bellom and Ramtine Tofighi Shirazi from SecMate (https://secmate.dev/)

Severity Score

Severity Score

Weakness Type (CWE)

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')

CWE-120

Top Fix

icon

Upgrade Version

Upgrade to version https://github.com/arduino/ArduinoCore-avr.git - 1.8.7

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): LOCAL
Attack Complexity (AC): LOW
Privileges Required (PR): NONE
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): NONE
Integrity (I): NONE
Availability (A): HIGH

Do you need more information?

Contact Us