CVE-2025-51823

libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libcsp:libcsp:2.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2025-08-11 19:15

Updated : 2025-08-14 16:24


NVD link : CVE-2025-51823

Mitre link : CVE-2025-51823

CVE.ORG link : CVE-2025-51823


JSON object : View

Products Affected

libcsp

  • libcsp
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')