Skip to content

fix: remove unsafe exec() in mmwave_sensor.c#414

Open
orbisai0security wants to merge 1 commit intoruvnet:mainfrom
orbisai0security:fix-fix-v-001-mmwave-memcpy-bounds-check
Open

fix: remove unsafe exec() in mmwave_sensor.c#414
orbisai0security wants to merge 1 commit intoruvnet:mainfrom
orbisai0security:fix-fix-v-001-mmwave-memcpy-bounds-check

Conversation

@orbisai0security
Copy link
Copy Markdown
Contributor

Summary

Fix high severity security issue in firmware/esp32-csi-node/main/mmwave_sensor.c.

Vulnerability

Field Value
ID V-001
Severity HIGH
Scanner multi_agent_ai
Rule V-001
File firmware/esp32-csi-node/main/mmwave_sensor.c:115

Description: Multiple memcpy operations in mmwave_sensor.c copy data from UART-received buffers directly into fixed-size local variables (float, uint32_t) without validating that the source buffer contains at least sizeof(destination_type) bytes. If the UART frame is shorter than expected, the memcpy reads beyond the end of the received data buffer, causing stack or heap corruption that can be exploited for arbitrary code execution on the ESP32.

Changes

  • firmware/esp32-csi-node/main/mmwave_sensor.c

Verification

  • Build passes
  • Scanner re-scan confirms fix
  • LLM code review passed

Automated security fix by OrbisAI Security

Automated security fix generated by Orbis Security AI
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

1 participant