CVE-2025-51823

libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
CVSS

No CVSS.

Configurations

Configuration 1 (hide)

cpe:2.3:a:libcsp:libcsp:2.0:*:*:*:*:*:*:*

History

14 Aug 2025, 16:24

Type Values Removed Values Added
References () https://github.com/libcsp/libcsp/pull/852 - () https://github.com/libcsp/libcsp/pull/852 - Patch
References () https://github.com/libcsp/libcsp/issues/850 - () https://github.com/libcsp/libcsp/issues/850 - Third Party Advisory
CPE cpe:2.3:a:libcsp:libcsp:2.0:*:*:*:*:*:*:*
First Time Libcsp
Libcsp libcsp

11 Aug 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-11 19:15

Updated : 2025-08-14 16:24


NVD link : CVE-2025-51823

Mitre link : CVE-2025-51823


JSON object : View

Products Affected

libcsp

  • libcsp
CWE

No CWE.