CVE-2025-67433

7.5 HIGH

📋 TL;DR

A heap buffer overflow vulnerability in Open TFTP Server MultiThreaded v1.7 allows attackers to cause a Denial of Service (DoS) by sending a specially crafted DATA packet. This affects anyone running the vulnerable version of this TFTP server software. The vulnerability is in the processRequest function and can be triggered remotely.

💻 Affected Systems

Products:
  • Open TFTP Server MultiThreaded
Versions: v1.7
Operating Systems: Windows, Linux, Other platforms where the software runs
Default Config Vulnerable: ⚠️ Yes
Notes: All installations of version 1.7 are vulnerable regardless of configuration.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete server crash leading to service unavailability, potentially allowing for remote code execution if the heap overflow can be controlled precisely.

🟠

Likely Case

Denial of Service causing the TFTP server to crash, disrupting file transfer services.

🟢

If Mitigated

Minimal impact if the server is behind network controls or not exposed to untrusted networks.

🌐 Internet-Facing: HIGH - TFTP servers are often exposed for file transfers and the exploit requires no authentication.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could exploit this to disrupt services.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: MEDIUM

Exploitation requires crafting a specific DATA packet but no authentication is needed. The references show analysis but no public exploit code.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check for updates beyond v1.7 on SourceForge

Vendor Advisory: https://sourceforge.net/projects/tftp-server/

Restart Required: Yes

Instructions:

1. Visit the SourceForge project page. 2. Download the latest version. 3. Stop the TFTP server service. 4. Install the updated version. 5. Restart the service.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict TFTP server access to trusted networks only using firewall rules.

Service Disablement

all

Temporarily disable the TFTP server if not critically needed.

🧯 If You Can't Patch

  • Implement strict network access controls to limit TFTP server exposure to only necessary clients.
  • Monitor server logs for unusual DATA packet patterns or crashes and have incident response procedures ready.

🔍 How to Verify

Check if Vulnerable:

Check the server version by examining the executable properties or running with --version flag if available.

Check Version:

On Windows: Check file properties of tftpserver.exe. On Linux: Run ./tftpserver --version or similar.

Verify Fix Applied:

Verify the installed version is newer than v1.7 and test with normal TFTP operations.

📡 Detection & Monitoring

Log Indicators:

  • Server crash logs
  • Error messages related to buffer overflow or memory corruption in TFTP logs

Network Indicators:

  • Unusually large or malformed TFTP DATA packets on UDP port 69

SIEM Query:

source="tftp.log" AND ("crash" OR "overflow" OR "memory")

🔗 References

📤 Share & Export