We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2025-2258

Eclipse ThreadX NetX Duo HTTP server single PUT request integer underflow



Description

In NetX Duo component HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length smaller than the data request size. A possible workaround is to disable HTTP PUT support. This issue follows an uncomplete fix in CVE-2025-0728.

Reserved 2025-03-12 | Published 2025-04-06 | Updated 2025-04-15 | Assigner eclipse


MEDIUM: 5.3CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:L/SC:N/SI:N/SA:N

Problem types

CWE-191: Integer Underflow (Wrap or Wraparound)

Product status

Default status
unaffected

Any version before 6.4.2
affected

Credits

Kelly Patterson of Cisco Talos finder

References

github.com/...ommit/6c8e9d1c95d71bd4b313e1cc37d8f8841543b248 patch

github.com/...etxduo/security/advisories/GHSA-chqp-8vf8-cj25 vendor-advisory

cve.org (CVE-2025-2258)

nvd.nist.gov (CVE-2025-2258)

Download JSON

Share this page
https://cve.threatint.eu/CVE/CVE-2025-2258

Support options

Helpdesk Chat, Email, Knowledgebase