Medium severityOSV Advisory· Published Jan 21, 2026· Updated Apr 15, 2026
CVE-2025-69209
CVE-2025-69209
Description
ArduinoCore-avr contains the source code and configuration files of the Arduino AVR Boards platform. A vulnerability in versions prior to 1.8.7 allows an attacker to trigger a stack-based buffer overflow when converting floating-point values to strings with high precision. By passing very large decimalPlaces values to the affected String constructors or concat methods, the dtostrf function writes beyond fixed-size stack buffers, causing memory corruption and denial of service. Under specific conditions, this could enable arbitrary code execution on AVR-based Arduino boards.
Patches
- The Fix is included starting from the
1.8.7release available from the following link ArduinoCore-avr v1.8.7
- The Fixing Commit is available at the following link 1a6a417f89c8901dad646efce74ae9d3ddebfd59
References
Credits
- Maxime Rossi Bellom and Ramtine Tofighi Shirazi from SecMate (https://secmate.dev/)
Affected products
1- Range: 1.6.22, 1.6.23, 1.8.1, …
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
5- github.com/arduino/ArduinoCore-avr/commit/82a8ad2fb33911d8927c7af22e0472b94325d1a7nvd
- github.com/arduino/ArduinoCore-avr/pull/613nvd
- github.com/arduino/ArduinoCore-avr/releases/tag/1.8.7nvd
- github.com/arduino/ArduinoCore-avr/security/advisories/GHSA-pvx3-fm7w-6hjmnvd
- support.arduino.cc/hc/en-us/articles/24985906702748-ASEC-26-001-ArduinoCore-AVR-v1-8-7-Resolves-Stack-Based-Buffer-Overflow-Vulnerabilitynvd
News mentions
0No linked articles in our index yet.