CVE-2025-0726
📋 TL;DR
A denial-of-service vulnerability in Eclipse ThreadX NetX Duo's HTTP server allows attackers to exhaust file handles by sending specially crafted packets. This causes all subsequent file requests to return 404 errors until the system is restarted. Affects all systems using NetX Duo HTTP server with PUT request support enabled.
💻 Affected Systems
- Eclipse ThreadX NetX Duo
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete HTTP service disruption requiring system reboot, potentially affecting critical embedded systems and IoT devices.
Likely Case
HTTP service becomes unavailable for file requests, disrupting web functionality until system restart.
If Mitigated
Minimal impact if PUT requests are disabled or systems are patched.
🎯 Exploit Status
Attack requires sending specially crafted packets but no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.2
Vendor Advisory: https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-pwf8-5q9w-m763
Restart Required: Yes
Instructions:
1. Update NetX Duo to version 6.4.2 or later. 2. Rebuild and redeploy your application. 3. Restart affected systems.
🔧 Temporary Workarounds
Disable PUT Request Support
allDisable HTTP PUT method support in NetX Duo configuration to prevent exploitation.
# In your NetX Duo configuration, set NX_DISABLE_HTTP_PUT to true or remove PUT method support
🧯 If You Can't Patch
- Disable HTTP PUT request support in configuration
- Implement network filtering to block suspicious HTTP PUT requests
- Monitor for abnormal 404 error patterns and restart services if detected
🔍 How to Verify
Check if Vulnerable:
Check NetX Duo version: if < 6.4.2 and HTTP server with PUT support is enabled, system is vulnerable.
Check Version:
# Check your NetX Duo library version in build configuration or source code
Verify Fix Applied:
Verify NetX Duo version is 6.4.2 or later and test HTTP PUT requests don't cause subsequent 404 errors.
📡 Detection & Monitoring
Log Indicators:
- Sudden increase in HTTP 404 errors after PUT requests
- File handle exhaustion warnings
- HTTP service restart events
Network Indicators:
- Malformed HTTP PUT packets
- Repeated PUT requests followed by GET requests returning 404
SIEM Query:
source="http_logs" status=404 | stats count by src_ip | where count > threshold