PatchSiren cyber security CVE debrief
CVE-2026-42854 Espressif CVE debrief
CVE-2026-42854 is a critical, network-reachable memory corruption issue in arduino-esp32’s WebServer multipart form parser. An attacker-controlled multipart boundary value can exhaust the loopTask stack and crash the device, with potential remote code execution. The issue is fixed in arduino-esp32 3.3.8.
- Vendor
- Espressif
- Product
- Arduino-Esp32
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2026-05-12
- Original CVE updated
- 2026-05-18
- Advisory published
- 2026-05-12
- Advisory updated
- 2026-05-18
Who should care
Developers and operators using arduino-esp32 on ESP32-family devices, especially if the firmware exposes a WebServer interface that accepts multipart/form-data requests from untrusted networks.
Technical summary
According to the NVD record and the GitHub security advisory, the WebServer multipart parser allocates a variable-length array on the stack using the Content-Type boundary parameter without enforcing a length limit. In affected versions prior to 3.3.8, a sufficiently long boundary string can overflow the 8192-byte loopTask stack, leading to a crash and possible code execution. NVD classifies the weakness as CWE-121 and assigns CVSS 3.1 AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H.
Defensive priority
Urgent. This is a critical, unauthenticated network attack surface issue with crash and potential code-execution impact, so affected firmware should be upgraded to 3.3.8 or later as soon as possible.
Recommended defensive actions
- Upgrade arduino-esp32 to version 3.3.8 or later.
- Inventory firmware that uses arduino-esp32 WebServer functionality, especially any multipart upload handling.
- Restrict exposure of device web interfaces to trusted networks or authenticated management paths until patched.
- If immediate upgrading is not possible, disable or remove multipart upload features where feasible.
- Monitor affected devices for unexpected crashes or repeated restarts that could indicate probing or exploitation attempts.
Evidence notes
The supplied NVD record lists the vulnerability as analyzed, with CVSS 3.1 vector AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H and weakness CWE-121. The vendor advisory at GitHub states that the multipart form parser used an attacker-controlled boundary length to size a stack VLA, and that versions prior to 3.3.8 are affected. The CVE was published on 2026-05-12 and last modified on 2026-05-18.
Official resources
-
CVE-2026-42854 CVE record
CVE.org
-
CVE-2026-42854 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Exploit, Vendor Advisory
Publicly disclosed on 2026-05-12 and updated in the CVE record on 2026-05-18. The fixed release identified in the supplied sources is arduino-esp32 3.3.8.