CVE-2025-55085

In NextX Duo before 6.4.4, in the HTTP client module, the network support code for Eclipse Foundation ThreadX, the parsing of HTTP header fields was missing bounds verification. A crafted server response could cause undefined behavior.
Configurations

Configuration 1 (hide)

cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*

History

27 Oct 2025, 14:33

Type Values Removed Values Added
First Time Eclipse threadx Netx Duo
Eclipse
CPE cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 7.5
References () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-9c77-rgp9-c2g2 - () https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-9c77-rgp9-c2g2 - Vendor Advisory, Exploit

17 Oct 2025, 15:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-10-17 15:15

Updated : 2025-10-27 14:33


NVD link : CVE-2025-55085

Mitre link : CVE-2025-55085

CVE.ORG link : CVE-2025-55085


JSON object : View

Products Affected

eclipse

  • threadx_netx_duo
CWE
CWE-125

Out-of-bounds Read

CWE-1286

Improper Validation of Syntactic Correctness of Input