CVE-2026-23833

CVE-2026-23833: The 4GB Loophole in Your Light Switch

Alon Barad
Alon Barad
Software Engineer

Jan 21, 2026·7 min read·6 visits

Executive Summary (TL;DR)

ESPHome, the software running on millions of DIY smart home devices, has a remote denial-of-service vulnerability. By sending a specially crafted protobuf message with a massive length field, an attacker can trigger an integer overflow during a safety check. This bypasses the buffer protection, causes the device to read invalid memory, and forces a hard crash/reboot. If you aren't using API encryption, anyone on your Wi-Fi can flicker your lights off indefinitely.

A classic integer overflow in ESPHome's API protobuf decoder allows remote attackers to crash devices by sending a malformed packet. This vulnerability highlights the dangers of pointer arithmetic in C++ on 32-bit microcontrollers.

Fix Analysis (1)

Technical Appendix

CVSS Score
7.5/ 10
CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:U
EPSS Probability
0.05%
Top 86% most exploited

Affected Systems

ESPHome Framework (2025.9.0 - 2025.12.6)ESP32ESP8266RP2040LibreTiny

Affected Versions Detail

Product
Affected Versions
Fixed Version
ESPHome
ESPHome
2025.9.0 - 2025.12.62025.12.7
AttributeDetail
CWE IDCWE-190
Attack VectorNetwork (TCP/6053)
CVSS v4.01.7 (Official)
Real World SeverityMedium/High (DoS)
ImpactDevice Crash / Boot Loop
Exploit StatusPoC Available
CWE-190
Integer Overflow

Integer Overflow or Wraparound

Vulnerability Timeline

Fix committed to repository
2026-01-16
GHSA Advisory Published
2026-01-19
CVE Assigned
2026-01-19