{"dataType":"CVE_RECORD","dataVersion":"5.2","cveMetadata":{"cveId":"CVE-2026-28519","assignerOrgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","state":"PUBLISHED","assignerShortName":"VulnCheck","dateReserved":"2026-02-27T21:07:55.466Z","datePublished":"2026-03-15T13:36:47.991Z","dateUpdated":"2026-03-16T14:20:19.096Z"},"containers":{"cna":{"providerMetadata":{"orgId":"83251b91-4cc7-4094-a5c7-464a1b83ea10","shortName":"VulnCheck","dateUpdated":"2026-03-15T13:36:47.991Z"},"datePublic":"2026-03-11T00:00:00.000Z","title":"arduino-TuyaOpen DnsServer Heap-Based Buffer Overflow Remote Code Execution","descriptions":[{"lang":"en","value":"arduino-TuyaOpen before version 1.2.1 contains a heap-based buffer overflow vulnerability in the DnsServer component. An attacker on the same local area network who controls the LAN DNS server can send malicious DNS responses to overflow the heap buffer, potentially allowing execution of arbitrary code on affected embedded devices."}],"problemTypes":[{"descriptions":[{"lang":"en","description":"Heap-based Buffer Overflow","cweId":"CWE-122","type":"CWE"}]}],"affected":[{"vendor":"Tuya","product":"arduino-TuyaOpen","versions":[{"version":"0","lessThan":"1.2.1","status":"affected","versionType":"semver"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NOT_DEFINED","Recovery":"NOT_DEFINED","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"ADJACENT","baseScore":8.7,"baseSeverity":"HIGH","exploitMaturity":"NOT_DEFINED","privilegesRequired":"NONE","providerUrgency":"NOT_DEFINED","subAvailabilityImpact":"NONE","subConfidentialityImpact":"NONE","subIntegrityImpact":"NONE","userInteraction":"NONE","valueDensity":"NOT_DEFINED","vectorString":"CVSS:4.0/AV:A/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"NOT_DEFINED"},"format":"CVSS"},{"cvssV3_1":{"attackComplexity":"LOW","attackVector":"ADJACENT_NETWORK","availabilityImpact":"HIGH","baseScore":8.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"NONE","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H","version":"3.1"},"format":"CVSS"}],"references":[{"url":"https://src.tuya.com/announcement/32","name":"Tuya SRC Security Advisory","tags":["vendor-advisory"]},{"url":"https://github.com/tuya/arduino-TuyaOpen","name":"arduino-TuyaOpen GitHub Repository","tags":["product"]},{"name":"VulnCheck Advisory: arduino-TuyaOpen DnsServer Heap-Based Buffer Overflow Remote Code Execution","tags":["third-party-advisory"],"url":"https://www.vulncheck.com/advisories/arduino-tuyaopen-dnsserver-heap-based-buffer-overflow-remote-code-execution"}],"x_generator":{"engine":"vulncheck"},"credits":[{"lang":"en","value":"Maxime ROSSI BELLOM","type":"finder"}]},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2026-28519","role":"CISA Coordinator","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2026-03-16T14:13:03.068394Z"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2026-03-16T14:20:19.096Z"}}]}}