A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Affected by this vulnerability is the function sys_device_close/sys_device_control/sys_device_find/sys_device_init/sys_device_open/sys_device_read/sys_device_register/sys_device_write/sys_event_delete/sys_event_recv/sys_event_send/sys_mb_delete/sys_mb_recv/sys_mb_send/sys_mb_send_wait/sys_mq_recv/sys_mq_send/sys_mq_urgent/sys_mutex_delete/sys_mutex_release/sys_mutex_take/sys_rt_timer_control/sys_rt_timer_delete/sys_rt_timer_start/sys_rt_timer_stop/sys_sem_delete/sys_sem_release/sys_sem_take/sys_shmat/sys_shmdt/sys_thread_create/sys_thread_delete/sys_thread_startup/sys_timer_delete/sys_timer_gettime/sys_timer_settime of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument arg[0] leads to information disclosure. An attack has to be approached locally.
References
| Link | Resource |
|---|---|
| https://github.com/RT-Thread/rt-thread/issues/9877 | Exploit Issue Tracking Vendor Advisory |
| https://vuldb.com/?ctiid.295021 | Permissions Required VDB Entry |
| https://vuldb.com/?id.295021 | Third Party Advisory VDB Entry |
| https://vuldb.com/?submit.489903 | Third Party Advisory VDB Entry |
Configurations
History
04 Nov 2025, 19:53
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://github.com/RT-Thread/rt-thread/issues/9877 - Exploit, Issue Tracking, Vendor Advisory | |
| References | () https://vuldb.com/?ctiid.295021 - Permissions Required, VDB Entry | |
| References | () https://vuldb.com/?id.295021 - Third Party Advisory, VDB Entry | |
| References | () https://vuldb.com/?submit.489903 - Third Party Advisory, VDB Entry | |
| First Time |
Rt-thread rt-thread
Rt-thread |
|
| CPE | cpe:2.3:a:rt-thread:rt-thread:*:*:*:*:*:*:*:* | |
| CWE | NVD-CWE-noinfo |
16 Feb 2025, 09:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| Summary | (en) A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Affected by this vulnerability is the function sys_device_close/sys_device_control/sys_device_find/sys_device_init/sys_device_open/sys_device_read/sys_device_register/sys_device_write/sys_event_delete/sys_event_recv/sys_event_send/sys_mb_delete/sys_mb_recv/sys_mb_send/sys_mb_send_wait/sys_mq_recv/sys_mq_send/sys_mq_urgent/sys_mutex_delete/sys_mutex_release/sys_mutex_take/sys_rt_timer_control/sys_rt_timer_delete/sys_rt_timer_start/sys_rt_timer_stop/sys_sem_delete/sys_sem_release/sys_sem_take/sys_shmat/sys_shmdt/sys_thread_create/sys_thread_delete/sys_thread_startup/sys_timer_delete/sys_timer_gettime/sys_timer_settime of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument arg[0] leads to information disclosure. An attack has to be approached locally. |
08 Feb 2025, 10:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-02-08 10:15
Updated : 2025-11-04 19:53
NVD link : CVE-2025-1115
Mitre link : CVE-2025-1115
CVE.ORG link : CVE-2025-1115
JSON object : View
Products Affected
rt-thread
- rt-thread
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor
CWE-284Improper Access Control
NVD-CWE-noinfo