Use After Free vulnerability was discovered in fs/vfs/fs_rename code of the Apache NuttX RTOS, that due recursive implementation and single buffer use by two different pointer variables allowed arbitrary user provided size buffer reallocation and write to the previously freed heap chunk, that in specific cases could cause unintended virtual filesystem rename/move operation results.
This issue affects Apache NuttX RTOS: from 7.20 before 12.11.0.
Users of virtual filesystem based services with write access especially when exposed over the network (i.e. FTP) are affected and recommended to upgrade to version 12.11.0 that fixes the issue.
References
| Link | Resource |
|---|---|
| https://github.com/apache/nuttx/pull/16455 | Issue Tracking |
| https://lists.apache.org/thread/7m83v11ldfq7bvw72n9t5sccocczocjn | Mailing List Vendor Advisory |
| http://www.openwall.com/lists/oss-security/2025/12/31/11 | Mailing List Third Party Advisory |
Configurations
History
06 Jan 2026, 14:35
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Apache
Apache nuttx |
|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
| CPE | cpe:2.3:a:apache:nuttx:*:*:*:*:*:*:*:* | |
| References | () https://github.com/apache/nuttx/pull/16455 - Issue Tracking | |
| References | () https://lists.apache.org/thread/7m83v11ldfq7bvw72n9t5sccocczocjn - Mailing List, Vendor Advisory | |
| References | () http://www.openwall.com/lists/oss-security/2025/12/31/11 - Mailing List, Third Party Advisory |
05 Jan 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
01 Jan 2026, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-01 17:15
Updated : 2026-01-06 14:35
NVD link : CVE-2025-48769
Mitre link : CVE-2025-48769
CVE.ORG link : CVE-2025-48769
JSON object : View
Products Affected
apache
- nuttx
CWE
CWE-416
Use After Free
