Home

Description

libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.

PUBLISHED Reserved 2025-06-16 | Published 2025-08-11 | Updated 2025-08-11 | Assigner mitre

References

github.com/libcsp/libcsp/issues/850

github.com/libcsp/libcsp/pull/852

cve.org (CVE-2025-51823)

nvd.nist.gov (CVE-2025-51823)

Download JSON