CVSS Vector
CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Lifecycle Timeline
4Tags
Description
A vulnerability, which was classified as critical, was found in RT-Thread 5.1.0. Affected is the function sys_recvfrom of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument from leads to memory corruption.
Analysis
Critical memory corruption vulnerability in RT-Thread 5.1.0's sys_recvfrom syscall handler that allows authenticated local attackers to corrupt kernel memory through improper argument validation. An attacker with local access and limited privileges can exploit this to achieve arbitrary code execution or denial of service, potentially compromising the entire embedded system running RT-Thread.
Technical Context
The vulnerability exists in rt-thread/components/lwp/lwp_syscall.c within the sys_recvfrom function, which handles the recvfrom network syscall in the RT-Thread lightweight process (lwp) subsystem. The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), indicating a classic buffer overflow or out-of-bounds memory access. The 'from' parameter passed to sys_recvfrom is not properly validated before being used in memory operations, allowing an attacker to write beyond allocated buffer boundaries. This affects RT-Thread's POSIX-compatible syscall layer, which is critical infrastructure for application sandboxing and process isolation in embedded systems using CPE:rt-thread:rt-thread:5.1.0.
Affected Products
RT-Thread (['5.1.0'])
Priority Score
Share
External POC / Exploit Code
Leaving vuln.today
EUVD-2025-17445