CVE-2025-2258
📋 TL;DR
This vulnerability in Eclipse ThreadX NetX Duo's HTTP server allows attackers to cause integer underflow and denial of service by sending specially crafted HTTP packets with Content-Length smaller than the actual data size. It affects systems using NetX Duo HTTP server functionality before version 6.4.3. This follows an incomplete fix from CVE-2025-0728.
💻 Affected Systems
- Eclipse ThreadX NetX Duo
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
Complete denial of service of the HTTP server component, potentially crashing the entire NetX Duo service and disrupting device functionality.
Likely Case
HTTP server becomes unresponsive, causing service disruption for HTTP-based communications and functionality.
If Mitigated
Minimal impact if HTTP PUT is disabled or systems are patched; normal operations continue unaffected.
🎯 Exploit Status
Exploitation requires sending specially crafted HTTP packets; no authentication needed.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 6.4.3
Vendor Advisory: https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-chqp-8vf8-cj25
Restart Required: Yes
Instructions:
1. Update NetX Duo to version 6.4.3 or later. 2. Rebuild and redeploy the application. 3. Restart the affected service or device.
🔧 Temporary Workarounds
Disable HTTP PUT Support
allDisable HTTP PUT method in NetX Duo HTTP server configuration to prevent exploitation.
Modify HTTP server configuration to disable PUT method support
🧯 If You Can't Patch
- Disable HTTP PUT support in NetX Duo configuration
- Implement network filtering to block malicious HTTP packets targeting this vulnerability
🔍 How to Verify
Check if Vulnerable:
Check NetX Duo version; if below 6.4.3 and HTTP server with PUT support is enabled, system is vulnerable.
Check Version:
Check application build configuration or runtime version reporting for NetX Duo version
Verify Fix Applied:
Verify NetX Duo version is 6.4.3 or later and confirm HTTP server functionality works without issues.
📡 Detection & Monitoring
Log Indicators:
- HTTP server crash logs
- Unusual HTTP PUT requests with mismatched Content-Length
- Denial of service alerts
Network Indicators:
- HTTP packets with Content-Length smaller than actual data size
- Multiple failed HTTP PUT requests
SIEM Query:
source="netxduo" AND (event="crash" OR event="dos") AND http_method="PUT"