CVE-2026-30363
Flipper Devices · flipperzero-firmware
A stack overflow vulnerability has been discovered in the "Main" function of the Flipper Zero firmware, commit ad2a80.
Executive summary
A stack overflow vulnerability in the Flipper Zero firmware could allow an attacker to cause system crashes or potentially execute arbitrary code.
Vulnerability
The vulnerability is a stack overflow located within the "Main" function of the firmware. This type of memory corruption flaw can be triggered by providing specially crafted input, potentially leading to arbitrary code execution or a denial-of-service state.
Business impact
With a CVSS score of 8.4, this vulnerability represents a significant risk to the integrity of the Flipper Zero device. Successful exploitation could allow an attacker to gain control over the device's operations, compromising any sensitive data stored or processed by the unit.
Remediation
Immediate Action: Update the Flipper Zero firmware to the latest available release that includes the patch for commit ad2a80.
Proactive Monitoring: Observe the device for unexpected reboots or unstable behavior that could indicate memory corruption attempts.
Compensating Controls: Avoid connecting the device to untrusted or malicious wireless environments that could deliver the payload required to trigger the overflow.
Exploitation status
Public Exploit Available: false
Analyst recommendation
Users of the Flipper Zero should verify their firmware version and update immediately to resolve this stack overflow. Given the risk of memory corruption, proactive patching is essential to maintain the security and operational reliability of the hardware.