CVE-2026-25532

Source
https://cve.org/CVERecord?id=CVE-2026-25532
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25532.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2026-25532
Aliases
  • GHSA-m2h2-683f-9mw7
Published
2026-02-04T17:58:08.100Z
Modified
2026-03-01T02:57:33.429636Z
Severity
  • 6.3 (Medium) CVSS_V3 - CVSS:3.1/AV:A/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:H CVSS Calculator
Summary
ESF-IDF is Vulnerable to WPS Enrollee Fragment Integer Underflow
Details

ESF-IDF is the Espressif Internet of Things (IOT) Development Framework. In versions 5.5.2, 5.4.3, 5.3.4, 5.2.6, and 5.1.6, a vulnerability exists in the WPS (Wi-Fi Protected Setup) Enrollee implementation where malformed EAP-WSC packets with truncated payloads can cause integer underflow during fragment length calculation. When processing EAP-Expanded (WSC) messages, the code computes fraglen by subtracting header sizes from the total packet length. If an attacker sends a packet where the EAP Length field covers only the header and flags but omits the expected payload (such as the 2-byte Message Length field when WPSMSGFLAGLEN is set), fraglen becomes negative. This negative value is then implicitly cast to sizet when passed to wpabufputdata(), resulting in a very large unsigned value. This issue has been patched in versions 5.5.3, 5.4.4, 5.3.5, 5.2.7, and 5.1.7.

Database specific
{
    "cna_assigner": "GitHub_M",
    "cwe_ids": [
        "CWE-191"
    ],
    "osv_generated_from": "https://github.com/CVEProject/cvelistV5/tree/main/cves/2026/25xxx/CVE-2026-25532.json"
}
References

Affected packages

Git / github.com/espressif/esp-idf

Affected ranges

Type
GIT
Repo
https://github.com/espressif/esp-idf
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

v0.*
v0.9
v1.*
v1.0
v2.*
v2.0-rc1
v2.1-rc1
v3.*
v3.0-dev
v3.1-beta1
v3.1-dev
v3.2-beta1
v3.2-dev
v3.3-beta1
v3.3-beta2
v3.3-dev
v4.*
v4.0-dev
v4.1-dev
v4.2-dev
v4.3-beta1
v4.3-dev
v4.4-dev
v5.*
v5.0-beta1
v5.0-dev
v5.1-dev
v5.2-dev
v5.3-dev
v5.4-dev
v5.5-dev
v6.*
v6.0-beta1
v6.0-dev

Database specific

source
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2026-25532.json"