In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before
version 6.4.2, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length smaller than the data request size. A
possible workaround is to disable HTTP PUT support.
References
Configurations
History
31 Jul 2025, 16:33
Type | Values Removed | Values Added |
---|---|---|
First Time |
Eclipse
Eclipse threadx Netx Duo |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
Summary |
|
|
CPE | cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:* | |
References | () https://github.com/eclipse-threadx/netxduo/commit/c78d650be7377aae1a8704bc0ce5cc6f9f189014 - Patch | |
References | () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-hqp7-4q26-6wqf - Vendor Advisory |
21 Feb 2025, 09:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-02-21 09:15
Updated : 2025-07-31 16:33
NVD link : CVE-2025-0728
Mitre link : CVE-2025-0728
CVE.ORG link : CVE-2025-0728
JSON object : View
Products Affected
eclipse
- threadx_netx_duo
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)