Vulnerability Details CVE-2025-2259
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before
version 6.4.3, an attacker can cause an integer underflow and a
subsequent denial of service by writing a very large file, by specially
crafted packets with Content-Length in one packet smaller than the data
request size of the other packet. A possible workaround is to disable
HTTP PUT support.
This issue follows an incomplete fix of CVE-2025-0727
Exploit prediction scoring system (EPSS) score
EPSS Score 0.0
EPSS Ranking 6.7%
CVSS Severity
CVSS v3 Score 7.5
Products affected by CVE-2025-2259
-
cpe:2.3:a:eclipse:threadx_netx_duo:-
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.0
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.0.1
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.0.2
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.10
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.11
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.12
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.2
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.3
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.4
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.5
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.6
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.7
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.8
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.1.9
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.2.0
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.2.1
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.3.0
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.4.0
-
cpe:2.3:a:eclipse:threadx_netx_duo:6.4.1