Eclipse ThreadX NetX Duo <6.4.3 HTTP int underflow DoS
CVE-2025-2259 Published on April 6, 2025

Eclipse ThreadX NetX Duo component HTTP server single PUT request integer underflow
In NetX HTTP server functionality of Eclipse ThreadX NetX Duo before version 6.4.3, an attacker can cause an integer underflow and a subsequent denial of service by writing a very large file, by specially crafted packets with Content-Length in one packet smaller than the data request size of the other packet. A possible workaround is to disable HTTP PUT support. This issue follows an incomplete fix of CVE-2025-0727

Vendor Advisory NVD

Weakness Type

What is an Integer underflow Vulnerability?

The product subtracts one value from another, such that the result is less than the minimum allowable integer value, which produces a value that is not equal to the correct result. This can happen in signed and unsigned cases.

CVE-2025-2259 has been classified to as an Integer underflow vulnerability or weakness.


Products Associated with CVE-2025-2259

Want to know whenever a new CVE is published for Eclipse Threadx Netx Duo? stack.watch will email you.

 

Affected Versions

Eclipse Foundation ThreadX:

Exploit Probability

EPSS
0.15%
Percentile
35.14%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.