We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
In NetX Duo component HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length smaller than the data request size. A possible workaround is to disable HTTP PUT support. This issue follows an uncomplete fix in CVE-2025-0728.
Reserved 2025-03-12 | Published 2025-04-06 | Updated 2025-04-15 | Assigner eclipseCWE-191: Integer Underflow (Wrap or Wraparound)
Kelly Patterson of Cisco Talos
github.com/...ommit/6c8e9d1c95d71bd4b313e1cc37d8f8841543b248
github.com/...etxduo/security/advisories/GHSA-chqp-8vf8-cj25
Support options