Project Subscriptions
No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Tue, 17 Mar 2026 16:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 16 Mar 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Dronecode
Dronecode px4 Drone Autopilot |
|
| CPEs | cpe:2.3:a:dronecode:px4_drone_autopilot:*:*:*:*:*:*:*:* cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:alpha1:*:*:*:*:*:* cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:beta1:*:*:*:*:*:* cpe:2.3:a:dronecode:px4_drone_autopilot:1.17.0:rc1:*:*:*:*:*:* |
|
| Vendors & Products |
Dronecode
Dronecode px4 Drone Autopilot |
Mon, 16 Mar 2026 10:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Px4
Px4 px4-autopilot |
|
| Vendors & Products |
Px4
Px4 px4-autopilot |
Fri, 13 Mar 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, The crsf_rc parser accepts an oversized variable-length known packet and copies it into a fixed 64-byte global buffer without a bounds check. In deployments where crsf_rc is enabled on a CRSF serial port, an adjacent/raw-serial attacker can trigger memory corruption and crash PX4. This vulnerability is fixed in 1.17.0-rc2. | |
| Title | PX4 autopilot has a global buffer overflow in crsf_rc via oversized variable-length known packet | |
| Weaknesses | CWE-120 CWE-787 |
|
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: GitHub_M
Published:
Updated: 2026-03-17T15:41:50.077Z
Reserved: 2026-03-13T14:33:42.823Z
Link: CVE-2026-32706
Updated: 2026-03-17T15:41:42.773Z
Status : Modified
Published: 2026-03-16T14:19:41.610
Modified: 2026-03-17T16:16:22.890
Link: CVE-2026-32706
No data.
OpenCVE Enrichment
Updated: 2026-03-16T09:22:44Z