-
Notifications
You must be signed in to change notification settings - Fork 20.3k
Description
Bug report
I found a buffer overflow vulnerability in ArduPilot:
- ESP32 WiFi drivers:
- In libraries/AP_HAL_ESP32/WiFiDriver.cpp and WiFiUdpDriver.cpp, strcpy is used to copy SSID and password into fixed-size buffers.
- SITL XPlane connector:
- In libraries/SITL/SIM_XPlane.cpp, strcpy is used to copy dataref names into fixed-size buffers.
Using strings longer than the buffer size can cause stack-buffer-overflow and program crash.
I verified this using a minimal test case compiled with AddressSanitizer.
Version
Branch: master
Commit: ed2c343
Platform
[X] All
[X] Copter
[X] Plane
[X] Rover
[X] Submarine
Airframe type
Not applicable (HAL/SITL issue)
Hardware type
- ESP32 (WiFi drivers)
- SITL (XPlane connector)
Logs
Screen.Recording.2025-12-27.at.5.59.25.AM.mov
Reactions are currently unavailable
Metadata
Metadata
Assignees
Labels
No labels