In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before
version 6.4.3, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length in one packet smaller than the data
request size of the other packet. A possible workaround is to disable
HTTP PUT support.
This issue follows an incomplete fix of CVE-2025-0727
References
Configurations
History
31 Jul 2025, 16:34
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
References | () https://github.com/eclipse-threadx/netxduo/commit/fb3195bbb6d0d6fe71a7a19585c008623c217f9e - Patch | |
References | () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-chhp-gmxc-46rq - Vendor Advisory | |
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2024-2104 - Third Party Advisory | |
First Time |
Eclipse
Eclipse threadx Netx Duo |
|
CPE | cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:* |
14 Apr 2025, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
07 Apr 2025, 14:17
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
06 Apr 2025, 19:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-04-06 19:15
Updated : 2025-07-31 16:34
NVD link : CVE-2025-2259
Mitre link : CVE-2025-2259
CVE.ORG link : CVE-2025-2259
JSON object : View
Products Affected
eclipse
- threadx_netx_duo
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)