Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-25532
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-04 Feb, 2026 | 18:16
Updated At-20 Feb, 2026 | 17:13

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, a vulnerability exists in the WPS (Wi-Fi Protected Setup) Enrollee implementation where malformed EAP-WSC packets with truncated payloads can cause integer underflow during fragment length calculation. When processing EAP-Expanded (WSC) messages, the code computes frag_len by subtracting header sizes from the total packet length. If an attacker sends a packet where the EAP Length field covers only the header and flags but omits the expected payload (such as the 2-byte Message Length field when WPS_MSG_FLAG_LEN is set), frag_len becomes negative. This negative value is then implicitly cast to size_t when passed to wpabuf_put_data(), resulting in a very large unsigned value. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.16.3MEDIUM
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Primary3.18.0HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 6.3
Base severity: MEDIUM
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H
Type: Primary
Version: 3.1
Base score: 8.0
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
CPE Matches

espressif
espressif
>>esp-idf>>5.1.6
cpe:2.3:a:espressif:esp-idf:5.1.6:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.2.6
cpe:2.3:a:espressif:esp-idf:5.2.6:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.3.4
cpe:2.3:a:espressif:esp-idf:5.3.4:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.4.3
cpe:2.3:a:espressif:esp-idf:5.4.3:*:*:*:*:*:*:*
espressif
espressif
>>esp-idf>>5.5.2
cpe:2.3:a:espressif:esp-idf:5.5.2:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-191Primarysecurity-advisories@github.com
CWE ID: CWE-191
Type: Primary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/espressif/esp-idf/commit/60f992a26de17bb5406f2149a2f8282dd7ad1c59security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/6f6766f917bc940ffbcc97eac4765a6ab15d5f79security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/73a587d42a57ece1962b6a4c530b574600650f63security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/b209fae993d795255827ce6b2b0d6942a377f5d4security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/b88befde6b5addcdd8d7373ce55c8052dea1e855security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/cad36beb4cde27abcf316cd90d8d8dddbc6f213asecurity-advisories@github.com
Patch
https://github.com/espressif/esp-idf/commit/de28801e8ea6a736b6f0db6fc0c682739363bb41security-advisories@github.com
Patch
https://github.com/espressif/esp-idf/security/advisories/GHSA-m2h2-683f-9mw7security-advisories@github.com
Third Party Advisory
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/60f992a26de17bb5406f2149a2f8282dd7ad1c59
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/6f6766f917bc940ffbcc97eac4765a6ab15d5f79
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/73a587d42a57ece1962b6a4c530b574600650f63
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/b209fae993d795255827ce6b2b0d6942a377f5d4
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/b88befde6b5addcdd8d7373ce55c8052dea1e855
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/cad36beb4cde27abcf316cd90d8d8dddbc6f213a
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/commit/de28801e8ea6a736b6f0db6fc0c682739363bb41
Source: security-advisories@github.com
Resource:
Patch
Hyperlink: https://github.com/espressif/esp-idf/security/advisories/GHSA-m2h2-683f-9mw7
Source: security-advisories@github.com
Resource:
Third Party Advisory
Patch
Change History
0Changes found

Details not found