<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>Dronecode — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/vendors/dronecode/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata. Fed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Fri, 08 May 2026 17:08:50 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/vendors/dronecode/feed.xml" rel="self" type="application/rss+xml"/><item><title>Dronecode PX4 Autopilot MavlinkLogHandler Stack Buffer Overflow DoS (CVE-2026-32743)</title><link>https://feed.craftedsignal.io/briefs/2026-05-px4-autopilot-dos/</link><pubDate>Fri, 08 May 2026 17:08:50 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2026-05-px4-autopilot-dos/</guid><description>A stack-based buffer overflow vulnerability exists in Dronecode PX4 Autopilot versions up to and including 1.17.0-rc2 that allows an attacker with MAVLink link access to cause a denial of service by creating a deeply nested directory via MAVLink FTP and then requesting the log list, crashing the MAVLink task.</description><content:encoded><![CDATA[<p>CVE-2026-32743 is a stack-based buffer overflow vulnerability affecting Dronecode PX4 Autopilot versions up to and including 1.17.0-rc2. The vulnerability resides in the <code>MavlinkLogHandler</code>, where the <code>LogEntry.filepath</code> buffer, limited to 60 bytes, is vulnerable to overflowing due to the use of <code>sscanf()</code> without a width specifier when parsing log directory paths. An attacker with network access to the flight controller&rsquo;s MAVLink UDP port (default 14550) can exploit this by creating a deeply nested directory exceeding 60 bytes via MAVLink FTP and then triggering the overflow by requesting the log list. This leads to a crash of the MAVLink task, resulting in loss of telemetry and command capability, and a persistent Denial of Service (DoS) until the system is rebooted. This was fixed in commit 616b25a which adds a width specifier to <code>sscanf</code>.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>The attacker establishes a MAVLink connection with the PX4 Autopilot system, typically over UDP port 14550.</li>
<li>MAVLink FTP is utilized to create a new directory inside the <code>/fs/microsd/log/</code> directory with a path exceeding 60 bytes. For example, &ldquo;/fs/microsd/log/&rdquo; + &ldquo;A&rdquo;*70.</li>
<li>The PX4 Autopilot system successfully creates the directory on the SD card.</li>
<li>The attacker sends a <code>MAV_CMD_REQUEST_LOG_LIST</code> command (command 261) to the PX4 Autopilot system.</li>
<li>The <code>MavlinkLogHandler::list()</code> function is invoked, attempting to read the log directory.</li>
<li>The vulnerable <code>sscanf(path, &quot;%s&quot;, LogEntry.filepath)</code> function is used without a width limit, copying the oversized path into the undersized <code>LogEntry.filepath</code> buffer.</li>
<li>A stack-based buffer overflow occurs, writing 70 bytes into a 60-byte buffer.</li>
<li>The MAVLink task crashes due to the buffer overflow, leading to a loss of telemetry and command capabilities and resulting in a denial-of-service condition.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition, where the PX4 Autopilot system becomes unmanageable and unresponsive. The MAVLink task crashes which means the flight controller loses telemetry and command capability until a reboot. This can be critical if the drone is in flight, as it will lose its ability to receive commands and potentially lead to a crash.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Upgrade PX4 Autopilot to a version later than 1.17.0-rc2, which includes the fix in commit 616b25a that adds a width specifier to <code>sscanf</code>.</li>
<li>Monitor network traffic for unusual MAVLink FTP activity, specifically the creation of deeply nested directories with path lengths exceeding 60 bytes within the <code>/fs/microsd/log/</code> directory, as this is indicative of CVE-2026-32743 exploitation.</li>
<li>Deploy the Sigma rule <code>Detect PX4 Autopilot MAVLink FTP Long Directory Creation</code> to detect the creation of overly long directory paths via MAVLink FTP, which is a prerequisite for exploiting CVE-2026-32743.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">advisory</category><category>px4</category><category>autopilot</category><category>drone</category><category>denial-of-service</category><category>buffer-overflow</category></item><item><title>Dronecode PX4-Autopilot tattu_can Stack Buffer Overflow (CVE-2026-32707)</title><link>https://feed.craftedsignal.io/briefs/2024-01-02-dronecode-px4-dos/</link><pubDate>Fri, 08 May 2026 11:12:14 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-02-dronecode-px4-dos/</guid><description>A stack-based buffer overflow vulnerability exists in the `tattu_can` driver of Dronecode PX4-Autopilot versions 1.17.0-rc1 and earlier; by injecting specially crafted CAN frames, an attacker can trigger an unbounded memcpy operation, leading to a stack corruption and subsequent crash of the PX4 process, resulting in a denial of service.</description><content:encoded><![CDATA[<p>A stack-based buffer overflow vulnerability, CVE-2026-32707, was discovered in the <code>tattu_can</code> driver of the Dronecode PX4-Autopilot flight controller firmware. This vulnerability affects versions up to and including 1.17.0-rc1. The flaw stems from an unbounded memcpy() operation within the multi-frame message assembly routine of the <code>Tattu12SBatteryMessage</code> structure. Successful exploitation allows an attacker capable of injecting CAN frames into the bus to trigger a stack corruption, causing the PX4 process to crash, leading to a denial-of-service condition. The vulnerability has been patched in PX4-Autopilot version 1.17.0-rc2.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>Attacker injects a CAN frame into the CAN bus with DLC=8 and the last byte of the data set to 0x80. This signals the start of a new <code>Tattu12SBatteryMessage</code>.</li>
<li>The <code>tattu_can</code> driver receives the start-of-transfer frame.</li>
<li>The driver allocates a 48-byte buffer on the stack (<code>tattu_message</code>). The first 5 bytes from the start frame are copied into the stack buffer.</li>
<li>The attacker sends seven subsequent CAN frames, each with DLC=8, containing the overflow payload (7 bytes of data per frame are copied).</li>
<li>The <code>tattu_can</code> driver processes each overflow frame, copying 7 bytes from each frame into the <code>tattu_message</code> buffer using <code>memcpy()</code>, incrementing the offset by 7 bytes after each copy.</li>
<li>After processing the seventh overflow frame, the cumulative offset exceeds the 48-byte buffer size.</li>
<li>The attacker sends a final overflow CAN frame, which triggers the last <code>memcpy()</code> operation, writing past the boundaries of the buffer on the stack.</li>
<li>The stack corruption leads to a segmentation fault or hard fault, causing the PX4 process to crash and resulting in a denial of service.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>Successful exploitation of this vulnerability leads to a denial-of-service condition on the PX4-Autopilot system. On a real flight controller, this can result in a loss of control of the drone, potentially causing it to crash. The vulnerability affects systems running PX4-Autopilot versions up to and including 1.17.0-rc1 with the <code>tattu_can</code> driver enabled.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Update PX4-Autopilot to version 1.17.0-rc2 or later, as specified in the &ldquo;Vulnerable &amp; Fixed Versions&rdquo; section of this brief.</li>
<li>Disable the <code>tattu_can</code> driver if it is not required by running <code>tattu_can stop</code> or removing it from the build, as mentioned in the &ldquo;Mitigation&rdquo; section.</li>
<li>Apply the patch manually, incorporating the bounds check added in commit <code>3f04b7a</code>, as detailed in the &ldquo;Mitigation&rdquo; section.</li>
<li>Monitor CAN bus traffic for suspicious frames with DLC=8 and a last byte of 0x80, followed by multiple overflow frames as described in the attack chain; implement rules to detect anomalous CAN traffic patterns.</li>
</ul>
]]></content:encoded><category domain="severity">medium</category><category domain="type">threat</category><category>stack buffer overflow</category><category>denial of service</category><category>CVE-2026-32707</category></item></channel></rss>