In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before
version 6.4.2, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length in one packet smaller than the data
request size of the other packet. A possible workaround is to disable
HTTP PUT support.
References
Configurations
History
No history.
Information
Published : 2025-02-21 09:15
Updated : 2025-07-31 16:33
NVD link : CVE-2025-0727
Mitre link : CVE-2025-0727
CVE.ORG link : CVE-2025-0727
JSON object : View
Products Affected
eclipse
- threadx_netx_duo
CWE
CWE-191
Integer Underflow (Wrap or Wraparound)
