CVE-2025-2258 – Eclipse ThreadX NetX Duo HTTP Server Integer Underflow Denial of Service Vulnerability

The following table lists the changes that have been made to the
CVE-2025-2258 vulnerability over time.

Vulnerability history details can be useful for understanding the evolution
of a vulnerability, and for identifying the most recent changes that may
impact the vulnerability’s severity, exploitability, or other characteristics.

  • New CVE Received
    by [email protected]

    Apr. 06, 2025

    Action Type Old Value New Value
    Added Description In NetX Duo component HTTP server functionality of Eclipse ThreadX NetX Duo before
    version 6.4.3, an attacker can cause an integer underflow and a
    subsequent denial of service by writing a very large file, by specially
    crafted packets with Content-Length smaller than the data request size. A
    possible workaround is to disable HTTP PUT support.

    This issue follows an uncomplete fix in CVE-2025-0728.

    Added CVSS V4.0 AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
    Added CWE CWE-191
    Added Reference https://github.com/eclipse-threadx/netxduo/commit/6c8e9d1c95d71bd4b313e1cc37d8f8841543b248
    Added Reference https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-chqp-8vf8-cj25
Share the Post:

Related Posts