CVE-2025-0728

In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.2, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length smaller than the data request size. A possible workaround is to disable HTTP PUT support.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*

History

31 Jul 2025, 16:33

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-hqp7-4q26-6wqf - () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-hqp7-4q26-6wqf - Vendor Advisory
References () https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014 - () https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014 - Patch
First Time Eclipse threadx Netx Duo
Eclipse
CPE cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*

21 Feb 2025, 09:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-02-21 09:15

Updated : 2025-07-31 16:33


NVD link : CVE-2025-0728

Mitre link : CVE-2025-0728


JSON object : View

Products Affected

eclipse

  • threadx_netx_duo
CWE

No CWE.