CVE-2025-0727

In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length in one packet smaller than the data request size of the other packet. A possible workaround is to disable HTTP PUT support.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*

History

31 Jul 2025, 16:33

Type Values Removed Values Added
CPE cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*
First Time Eclipse threadx Netx Duo
Eclipse
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-jf6x-9mgc-p72w - () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-jf6x-9mgc-p72w - Vendor Advisory
References () https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014 - () https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014 - Patch

21 Feb 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-21 09:15

Updated : 2025-07-31 16:33


NVD link : CVE-2025-0727

Mitre link : CVE-2025-0727


JSON object : View

Products Affected

eclipse

  • threadx_netx_duo
CWE

No CWE.