Full Disclosure: TinyOS 2.1.2 Stack-Based Buffer Overflow in mcp2200gpio
seclists.org·17h
🔬Floppy imaging
Preview
Report Post

Full Disclosure mailing list archives


From: Ron E <ronaldjedgerson () gmail com> Date: Thu, 8 Jan 2026 10:28:22 -0500


A stack-based buffer overflow vulnerability exists in the mcp2200gpio
utility due to unsafe use of strcpy() and strcat() when constructing device
paths during automatic device discovery. A local attacker can trigger the
vulnerability by creating a specially crafted filename under /dev/usb/,
resulting in stack memory corruption and a process crash. In non-hardened
builds, this may lead to arbitrary code execution.

*Root Cause:*

The vulnerability occurs when the program scans /dev/usb/ for HID devices
and constructs a device path using unbounded string operations:

char temppath[255];
strcpy(temppath, "/dev...

Similar Posts

Loading similar posts...

Keyboard Shortcuts

Navigation
Next / previous item
j/k
Open post
oorEnter
Preview post
v
Post Actions
Love post
a
Like post
l
Dislike post
d
Undo reaction
u
Recommendations
Add interest / feed
Enter
Not interested
x
Go to
Home
gh
Interests
gi
Feeds
gf
Likes
gl
History
gy
Changelog
gc
Settings
gs
Browse
gb
Search
/
General
Show this help
?
Submit feedback
!
Close modal / unfocus
Esc

Press ? anytime to show this help