Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2026-41429
Analyzed
More InfoOfficial Page
Source-security-advisories@github.com
View Known Exploited Vulnerability (KEV) details
Published At-24 Apr, 2026 | 20:16
Updated At-05 May, 2026 | 18:12

arduino-esp32 is an Arduino core for the ESP32, ESP32-S2, ESP32-S3, ESP32-C3, ESP32-C6 and ESP32-H2 microcontrollers. Prior to 3.3.8, there is a remotely reachable memory corruption issue in the NBNS packet handling path. When NetBIOS is enabled by calling NBNS.begin(...), the device listens on UDP port 137 and processes untrusted NBNS requests from the local network. The request parser trusts the attacker-controlled name_len field without enforcing a bound consistent with the fixed-size destination buffers used later in the flow. This vulnerability is fixed in 3.3.8.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Secondary3.18.8HIGH
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Type: Secondary
Version: 3.1
Base score: 8.8
Base severity: HIGH
Vector:
CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CPE Matches

espressif
espressif
>>arduino-esp32>>Versions before 3.3.8(exclusive)
cpe:2.3:a:espressif:arduino-esp32:*:*:*:*:*:*:*:*
espressif
espressif
>>esp32>>-
cpe:2.3:h:espressif:esp32:-:*:*:*:*:*:*:*
espressif
espressif
>>esp32-c3>>-
cpe:2.3:h:espressif:esp32-c3:-:*:*:*:*:*:*:*
espressif
espressif
>>esp32-c6>>-
cpe:2.3:h:espressif:esp32-c6:-:*:*:*:*:*:*:*
espressif
espressif
>>esp32-h2>>-
cpe:2.3:h:espressif:esp32-h2:-:*:*:*:*:*:*:*
espressif
espressif
>>esp32-s2>>-
cpe:2.3:h:espressif:esp32-s2:-:*:*:*:*:*:*:*
espressif
espressif
>>esp32-s3>>-
cpe:2.3:h:espressif:esp32-s3:-:*:*:*:*:*:*:*
Weaknesses
CWE IDTypeSource
CWE-121Secondarysecurity-advisories@github.com
CWE ID: CWE-121
Type: Secondary
Source: security-advisories@github.com
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://github.com/espressif/arduino-esp32/security/advisories/GHSA-92j9-c75g-2c5fsecurity-advisories@github.com
Exploit
Vendor Advisory
https://github.com/espressif/arduino-esp32/security/advisories/GHSA-92j9-c75g-2c5f134c704f-9b21-4f2e-91b3-4a467353bcc0
Exploit
Vendor Advisory
Hyperlink: https://github.com/espressif/arduino-esp32/security/advisories/GHSA-92j9-c75g-2c5f
Source: security-advisories@github.com
Resource:
Exploit
Vendor Advisory
Hyperlink: https://github.com/espressif/arduino-esp32/security/advisories/GHSA-92j9-c75g-2c5f
Source: 134c704f-9b21-4f2e-91b3-4a467353bcc0
Resource:
Exploit
Vendor Advisory
Change History
0Changes found

Details not found