Cyber Posture

CVE-2026-32706

HighPublic PoC

Published: 16 March 2026

Published
16 March 2026
Modified
17 March 2026
KEV Added
Patch
CVSS Score 7.1 CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H
EPSS Score 0.0003 7.4th percentile
Risk Priority 14 60% EPSS · 20% KEV · 20% CVSS

Summary

CVE-2026-32706 is a high-severity Classic Buffer Overflow (CWE-120) vulnerability in Dronecode Px4 Drone Autopilot. Its CVSS base score is 7.1 (High).

Operationally, exploitation aligns with the MITRE ATT&CK technique Application or System Exploitation (T1499.004); ranked at the 7.4th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.

Threat & Defense at a Glance

What attackers do: exploitation maps to Application or System Exploitation (T1499.004).
Threat & Defense Details

Likely Mitigating ControlsAI

Per-CVE control mapping for this CVE has not run yet; the list below is derived from the weakness types (CWEs) cited in the NVD entry.

addresses: CWE-120

Platform-independent managed code eliminates the need for unchecked native buffer copies that are the root cause of classic buffer overflows.

addresses: CWE-787

Out-of-bounds writes that corrupt control flow or inject shellcode are rendered non-executable by the same memory protections.

MITRE ATT&CK Enterprise TechniquesAI

T1499.004 Application or System Exploitation Impact
Adversaries may exploit software vulnerabilities that can cause an application or system to crash and deny availability to users.
Why these techniques?

Buffer overflow in crsf_rc parser enables direct exploitation causing reliable system crash and availability impact (A:H), matching Application or System Exploitation under Endpoint DoS.

Confidence: HIGH · MITRE ATT&CK Enterprise v18.1

NVD Description

PX4 autopilot is a flight control solution for drones. Prior to 1.17.0-rc2, The crsf_rc parser accepts an oversized variable-length known packet and copies it into a fixed 64-byte global buffer without a bounds check. In deployments where crsf_rc is enabled…

more

on a CRSF serial port, an adjacent/raw-serial attacker can trigger memory corruption and crash PX4. This vulnerability is fixed in 1.17.0-rc2.

Deeper analysisAI

CVE-2026-32706 is a buffer overflow vulnerability (CWE-120, CWE-787) in the crsf_rc parser of PX4 Autopilot, an open-source flight control solution for drones. In versions prior to 1.17.0-rc2, the parser accepts oversized variable-length packets and copies them into a fixed 64-byte global buffer without performing bounds checks, leading to potential memory corruption. The issue was published on 2026-03-16 and carries a CVSS v3.1 base score of 7.1 (AV:A/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:H), emphasizing high availability impact with low integrity disruption.

An adjacent or raw-serial attacker can exploit this vulnerability in deployments where crsf_rc is enabled on a CRSF serial port. By sending a malicious oversized packet, the attacker triggers memory corruption, reliably crashing the PX4 system and potentially disrupting drone operations. No privileges, user interaction, or remote network access are required, but physical or adjacent proximity to the serial interface is necessary.

The official GitHub security advisory (GHSA-mqgj-hh4g-fg5p) confirms the vulnerability is fixed in PX4 Autopilot version 1.17.0-rc2. Security practitioners should ensure deployments upgrade to this version or later, disable crsf_rc on exposed CRSF ports if feasible, and monitor serial interfaces for anomalous traffic.

Details

CWE(s)

Affected Products

dronecode
px4 drone autopilot
1.17.0 · ≤ 1.17.0

CVEs Like This One

CVE-2024-40427Same product: Dronecode Px4 Drone Autopilot
CVE-2026-26741Same product: Dronecode Px4 Drone Autopilot
CVE-2026-26742Same product: Dronecode Px4 Drone Autopilot
CVE-2026-32708Same product: Dronecode Px4 Drone Autopilot
CVE-2025-25372Shared CWE-787
CVE-2024-7695Shared CWE-787
CVE-2025-27598Shared CWE-787
CVE-2026-29775Shared CWE-787
CVE-2025-28220Shared CWE-120
CVE-2025-23412Shared CWE-120

References