A stack-use-after-return issue exists in the Arduino_Core_STM32 library prior to version 1.7.0. The pwm_start() function allocates a TIM_HandleTypeDef structure on the stack and passes its address to HAL initialization routines, where it is stored in a global timer handle registry. After the function returns, interrupt service routines may dereference this dangling pointer, resulting in memory corruption.
History

Wed, 22 Apr 2026 21:30:00 +0000

Type Values Removed Values Added
Weaknesses CWE-825

Wed, 22 Apr 2026 20:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-562

Wed, 22 Apr 2026 09:15:00 +0000

Type Values Removed Values Added
Title Stack‑Use‑After‑Return in Arduino_Core_STM32 Causes Memory Corruption

Wed, 22 Apr 2026 07:45:00 +0000

Type Values Removed Values Added
Title Stack Use-After-Return in Arduino STM32 Core Library Causing Memory Corruption
Weaknesses CWE-416

Wed, 22 Apr 2026 00:00:00 +0000

Type Values Removed Values Added
Weaknesses CWE-825
Metrics cvssV3_1

{'score': 5.3, 'vector': 'CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L'}

ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Mon, 20 Apr 2026 19:00:00 +0000

Type Values Removed Values Added
Title Stack Use-After-Return in Arduino STM32 Core Library Causing Memory Corruption
Weaknesses CWE-416

Mon, 20 Apr 2026 17:45:00 +0000

Type Values Removed Values Added
Description A stack-use-after-return issue exists in the Arduino_Core_STM32 library prior to version 1.7.0. The pwm_start() function allocates a TIM_HandleTypeDef structure on the stack and passes its address to HAL initialization routines, where it is stored in a global timer handle registry. After the function returns, interrupt service routines may dereference this dangling pointer, resulting in memory corruption.
References

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published: 2026-04-20T00:00:00.000Z

Updated: 2026-04-22T19:53:16.622Z

Reserved: 2026-02-16T00:00:00.000Z

Link: CVE-2026-26399

cve-icon Vulnrichment

Updated: 2026-04-21T19:50:07.094Z

cve-icon NVD

Status : Awaiting Analysis

Published: 2026-04-20T18:16:25.040

Modified: 2026-04-22T21:16:39.350

Link: CVE-2026-26399

cve-icon Redhat

No data.