CVE-2025-14857 PUBLISHED

Semtech LR11xx Memory Write Access Control Bypass

Assigner: SWI
Reserved: 18.12.2025 Published: 07.04.2026 Updated: 07.04.2026

An improper access control vulnerability exists in Semtech LoRa LR11xxx transceivers running early versions of firmware where the memory write command accessible via the physical SPI interface fails to enforce write protection on the program call stack. An attacker with physical access to the SPI interface can overwrite stack memory to hijack program control flow and achieve limited arbitrary code execution. However, the impact is limited to the active attack session: the device's secure boot mechanism prevents persistent firmware modification, the crypto engine isolates cryptographic keys from direct firmware access, and all modifications are lost upon device reboot or loss of physical access.

Metrics

CVSS Vector: CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:N/AU:N/R:A/V:D/RE:M
CVSS Score: 5.4

Product Status

Vendor Semtech
Product LR1110
Versions Default: unaffected
  • affected from 0 to TRX FW 0x0402 (excl.)
Vendor Semtech
Product LR1120
Versions Default: unaffected
  • affected from 0 to TRX FW 0x0202 (excl.)
Vendor Semtech
Product LR1121
Versions Default: unaffected
  • affected from 0 to TRX FW 0x0104 (excl.)

Credits

  • Egor (radioegor146) Koleda, https://github.com/radioegor146 finder

References

Problem Types

  • CWE-123 Write-what-where Condition CWE

Impacts

  • CAPEC-679 Exploitation of Improperly Configured or Implemented Memory Protections