Description
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length in one packet smaller than the data request size of the other packet. A possible workaround is to disable HTTP PUT support. This issue follows an incomplete fix of CVE-2025-0727
Problem types
CWE-191: Integer Underflow (Wrap or Wraparound)
Product status
Any version before 6.4.2
Credits
Kelly Patterson of Cisco Talos
References
www.talosintelligence.com/...ability_reports/TALOS-2024-2104
github.com/...ommit/fb3195bbb6d0d6fe71a7a19585c008623c217f9e
github.com/...etxduo/security/advisories/GHSA-chhp-gmxc-46rq
Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.