Areas
Our main research tracks.
Hardware hacking
From PCB to shell: firmware extraction via JTAG, UART and SPI flash, embedded debug surface analysis and attack vector mapping on live hardware.
Firmware analysis
Binary reverse engineering of embedded targets: filesystem carving, entropy analysis, hardcoded secret extraction and vulnerability research across ARM and Xtensa architectures.
IoT/OT protocols
Protocol-level assessment of Modbus, MQTT and CAN in operational contexts. Wireless attack surface evaluation across Wi-Fi, BLE and GPRS on deployed IoT/OT infrastructure.
ESP32 security
Full-stack ESP32 research: NVS key extraction, encrypted C2 architecture, offensive Wi-Fi module development and firmware hardening on ESP-IDF targets.
CVEs & Advisories
Discovered and reported by Espilon.
| CVE | Severity | Title |
|---|---|---|
| CVE-2026-45328 | Critical | Out-of-Bounds Write in ESP-TEE Secure Service Wrappers → |
| CVE-2026-7424 | High | Integer Underflow: DHCPv6 Sub-Option Parser → |
| CVE-2026-7426 | High | Out-of-Bounds Write: IPv6 Router Advertisement → |
| CVE-2026-8686 | High | DoS from MQTT v5.0 Deserialization Fault in coreMQTT → |
| CVE-2026-45329 | High | Out-of-Bounds Read in ESP-TEE Secure Service Wrappers → |
| CVE-2026-7425 | Medium | Out-of-Bounds Read: IPv6 RA Option Parser → |
| CVE-2026-7422 | Medium | MAC Address Validation Bypass → |
Write-ups & publications
Technical articles, CTF write-ups and research notes.
Espilon CTF Write-ups
Full solutions for all 27 challenges from the 2026 edition: hardware, IoT, OT, ESP32 and networks.
Research notes & articles
Technical articles published regularly on hardware security, reverse engineering and embedded protocols.
Tools & resources
Open-source projects published by the association.