CVE-2025-5869

| EUVD-2025-17445 HIGH
2025-06-09 [email protected]
8.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Attack Vector
Adjacent
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 14, 2026 - 19:21 vuln.today
EUVD ID Assigned
Mar 14, 2026 - 19:21 euvd
EUVD-2025-17445
PoC Detected
Jul 11, 2025 - 18:07 vuln.today
Public exploit code
CVE Published
Jun 09, 2025 - 09:15 nvd
HIGH 8.0

Description

A vulnerability, which was classified as critical, was found in RT-Thread 5.1.0. Affected is the function sys_recvfrom of the file rt-thread/components/lwp/lwp_syscall.c. The manipulation of the argument from leads to memory corruption.

Analysis

Critical memory corruption vulnerability in RT-Thread 5.1.0's sys_recvfrom syscall handler that allows authenticated local attackers to corrupt kernel memory through improper argument validation. An attacker with local access and limited privileges can exploit this to achieve arbitrary code execution or denial of service, potentially compromising the entire embedded system running RT-Thread.

Technical Context

The vulnerability exists in rt-thread/components/lwp/lwp_syscall.c within the sys_recvfrom function, which handles the recvfrom network syscall in the RT-Thread lightweight process (lwp) subsystem. The root cause is classified as CWE-119 (Improper Restriction of Operations within the Bounds of a Memory Buffer), indicating a classic buffer overflow or out-of-bounds memory access. The 'from' parameter passed to sys_recvfrom is not properly validated before being used in memory operations, allowing an attacker to write beyond allocated buffer boundaries. This affects RT-Thread's POSIX-compatible syscall layer, which is critical infrastructure for application sandboxing and process isolation in embedded systems using CPE:rt-thread:rt-thread:5.1.0.

Affected Products

RT-Thread (['5.1.0'])

Priority Score

60
Low Medium High Critical
KEV: 0
EPSS: +0.4
CVSS: +40
POC: +20

Share

CVE-2025-5869 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy