Embedded security

Research

Association's technical work on embedded systems, IoT and OT security.

Areas

Our main research tracks.

01

Hardware hacking

From PCB to shell: firmware extraction via JTAG, UART and SPI flash, embedded debug surface analysis and attack vector mapping on live hardware.

02

Firmware analysis

Binary reverse engineering of embedded targets: filesystem carving, entropy analysis, hardcoded secret extraction and vulnerability research across ARM and Xtensa architectures.

03

IoT/OT protocols

Protocol-level assessment of Modbus, MQTT and CAN in operational contexts. Wireless attack surface evaluation across Wi-Fi, BLE and GPRS on deployed IoT/OT infrastructure.

04

ESP32 security

Full-stack ESP32 research: NVS key extraction, encrypted C2 architecture, offensive Wi-Fi module development and firmware hardening on ESP-IDF targets.

CVEs & Advisories

Discovered and reported by Espilon.

CVE Vendor Severity CVSS Title
CVE-2026-45328 Espressif Systems Critical 9.3 Out-of-Bounds Write in ESP-TEE Secure Service Wrappers
CVE-2026-7424 Amazon Web Services High 8.1 Integer Underflow: DHCPv6 Sub-Option Parser
CVE-2026-7426 Amazon Web Services High 8.1 Out-of-Bounds Write: IPv6 Router Advertisement
CVE-2026-8686 Amazon Web Services High 7.5 DoS from MQTT v5.0 Deserialization Fault in coreMQTT
CVE-2026-45329 Espressif Systems High 7.1 Out-of-Bounds Read in ESP-TEE Secure Service Wrappers
CVE-2026-7425 Amazon Web Services Medium 6.5 Out-of-Bounds Read: IPv6 RA Option Parser
CVE-2026-7422 Amazon Web Services Medium 6.5 MAC Address Validation Bypass

Write-ups & publications

Technical articles, CTF write-ups and research notes.

CTF 2026

Espilon CTF Write-ups

Full solutions for all 27 challenges from the 2026 edition: hardware, IoT, OT, ESP32 and networks.

GitHub →
Blog

Research notes & articles

Technical articles published regularly on hardware security, reverse engineering and embedded protocols.

Read the blog →