Jin Chang

2 exploits Active since Apr 2026
CVE-2026-26399 NOMISEC MEDIUM WRITEUP
Arduino_Core_STM32 <1.7.0 - Use After Free
A stack-use-after-return issue exists in the Arduino_Core_STM32 library prior to version 1.7.0. The pwm_start() function allocates a TIM_HandleTypeDef structure on the stack and passes its address to HAL initialization routines, where it is stored in a global timer handle registry. After the function returns, interrupt service routines may dereference this dangling pointer, resulting in memory corruption.
1 stars
CVSS 5.3
CVE-2026-26399 WRITEUP MEDIUM WRITEUP
Arduino_Core_STM32 <1.7.0 - Use After Free
A stack-use-after-return issue exists in the Arduino_Core_STM32 library prior to version 1.7.0. The pwm_start() function allocates a TIM_HandleTypeDef structure on the stack and passes its address to HAL initialization routines, where it is stored in a global timer handle registry. After the function returns, interrupt service routines may dereference this dangling pointer, resulting in memory corruption.
CVSS 5.3