We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.
Please see our statement on Data Privacy.
A vulnerability, which was classified as critical, was found in RT-Thread up to 5.1.0. This affects the function sys_device_open/sys_device_read/sys_device_control/sys_device_init/sys_device_close/sys_device_write of the file components/drivers/core/device.c. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way.
Es wurde eine kritische Schwachstelle in RT-Thread bis 5.1.0 gefunden. Betroffen hiervon ist die Funktion sys_device_open/sys_device_read/sys_device_control/sys_device_init/sys_device_close/sys_device_write der Datei components/drivers/core/device.c. Durch Manipulieren mit unbekannten Daten kann eine memory corruption-Schwachstelle ausgenutzt werden. Der Angriff muss lokal erfolgen.
2025-06-26: | Advisory disclosed |
2025-06-26: | VulDB entry created |
2025-06-26: | VulDB entry last update |
Zephyr Saxon (VulDB User)
vuldb.com/?id.313959 (VDB-313959 | RT-Thread device.c sys_device_write memory corruption)
vuldb.com/?ctiid.313959 (VDB-313959 | CTI Indicators (IOB, IOC, IOA))
vuldb.com/?submit.595813 (Submit #595813 | RT-Thread 5.1.0 Code Injection)
vuldb.com/?submit.595814 (Submit #595814 | RT-Thread 5.1.0 Insufficient Control Flow Management (Duplicate))
vuldb.com/?submit.595827 (Submit #595827 | RT-Thread 5.1.0 Improper Handling of Parameters (Duplicate))
vuldb.com/?submit.595869 (Submit #595869 | RT-Thread 5.1.0 Improper Handling of Parameters (Duplicate))
vuldb.com/?submit.595870 (Submit #595870 | RT-Thread 5.1.0 Improper Handling of Parameters (Duplicate))
vuldb.com/?submit.595871 (Submit #595871 | RT-Thread 5.1.0 Improper Handling of Parameters (Duplicate))
github.com/RT-Thread/rt-thread/issues/10387
Support options