High severity8.8NVD Advisory· Published Mar 16, 2026· Updated Apr 27, 2026
CVE-2026-3556
CVE-2026-3556
Description
Philips Hue Bridge HomeKit Pair-Setup Heap-based Buffer Overflow Remote Code Execution Vulnerability. This vulnerability allows network-adjacent attackers to execute arbitrary code on affected installations of Philips Hue Bridge. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the hk_hap_pair_storage_put function. The issue results from the lack of proper validation of the length of user-supplied data prior to copying it to a fixed-length heap-based buffer. An attacker can leverage this vulnerability to execute code in the context of the HomeKit service. Was ZDI-CAN-28326.
Affected products
1- cpe:2.3:o:philips:hue_bridge_v2_firmware:*:*:*:*:*:*:*:*Range: <1975170000
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
1- www.zerodayinitiative.com/advisories/ZDI-26-154/nvdThird Party Advisory
News mentions
0No linked articles in our index yet.