CVE-2025-2258

7.5 HIGH

📋 TL;DR

This vulnerability in Eclipse ThreadX NetX Duo's HTTP server allows attackers to cause integer underflow and denial of service by sending specially crafted HTTP packets with Content-Length smaller than the actual data size. It affects systems using NetX Duo HTTP server functionality before version 6.4.3. This follows an incomplete fix from CVE-2025-0728.

💻 Affected Systems

Products:
  • Eclipse ThreadX NetX Duo
Versions: All versions before 6.4.3
Operating Systems: Any OS running NetX Duo (commonly embedded systems)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with HTTP server functionality enabled and HTTP PUT support active.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service of the HTTP server component, potentially crashing the entire NetX Duo service and disrupting device functionality.

🟠

Likely Case

HTTP server becomes unresponsive, causing service disruption for HTTP-based communications and functionality.

🟢

If Mitigated

Minimal impact if HTTP PUT is disabled or systems are patched; normal operations continue unaffected.

🌐 Internet-Facing: HIGH
🏢 Internal Only: MEDIUM

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires sending specially crafted HTTP packets; no authentication needed.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 6.4.3

Vendor Advisory: https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-chqp-8vf8-cj25

Restart Required: Yes

Instructions:

1. Update NetX Duo to version 6.4.3 or later. 2. Rebuild and redeploy the application. 3. Restart the affected service or device.

🔧 Temporary Workarounds

Disable HTTP PUT Support

all

Disable HTTP PUT method in NetX Duo HTTP server configuration to prevent exploitation.

Modify HTTP server configuration to disable PUT method support

🧯 If You Can't Patch

  • Disable HTTP PUT support in NetX Duo configuration
  • Implement network filtering to block malicious HTTP packets targeting this vulnerability

🔍 How to Verify

Check if Vulnerable:

Check NetX Duo version; if below 6.4.3 and HTTP server with PUT support is enabled, system is vulnerable.

Check Version:

Check application build configuration or runtime version reporting for NetX Duo version

Verify Fix Applied:

Verify NetX Duo version is 6.4.3 or later and confirm HTTP server functionality works without issues.

📡 Detection & Monitoring

Log Indicators:

  • HTTP server crash logs
  • Unusual HTTP PUT requests with mismatched Content-Length
  • Denial of service alerts

Network Indicators:

  • HTTP packets with Content-Length smaller than actual data size
  • Multiple failed HTTP PUT requests

SIEM Query:

source="netxduo" AND (event="crash" OR event="dos") AND http_method="PUT"

🔗 References

📤 Share & Export