Rt Thread

7 CVEs product

Monthly

CVE-2025-6693 HIGH POC This Week

A vulnerability, which was classified as critical, was found in RT-Thread up to 5.1.0. This affects the function sys_device_open/sys_device_read/sys_device_control/sys_device_init/sys_device_close/sys_device_write of the file components/drivers/core/device.c. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way.

Buffer Overflow Rt Thread
NVD GitHub VulDB
CVSS 3.1
7.8
EPSS
0.0%
CVE-2025-5869 HIGH POC This Week

Critical memory corruption vulnerability in RT-Thread 5.1.0's sys_recvfrom syscall handler that allows authenticated local attackers to corrupt kernel memory through improper argument validation. An attacker with local access and limited privileges can exploit this to achieve arbitrary code execution or denial of service, potentially compromising the entire embedded system running RT-Thread.

Buffer Overflow Rt Thread
NVD GitHub VulDB
CVSS 3.1
8.0
EPSS
0.4%
CVE-2025-5868 HIGH POC This Week

Critical array index validation vulnerability in RT-Thread 5.1.0's signal mask syscall handler that allows authenticated local attackers to read and modify kernel memory with high impact. The vulnerability exists in the sys_thread_sigprocmask function where improper validation of the 'how' parameter enables out-of-bounds array access, potentially leading to privilege escalation or denial of service. This is an actively exploitable vulnerability requiring local access and low privileges with no user interaction needed.

Information Disclosure Rt Thread
NVD GitHub VulDB
CVSS 3.1
8.0
EPSS
0.3%
CVE-2025-5867 HIGH POC This Week

Critical null pointer dereference vulnerability in RT-Thread 5.1.0's lwp_syscall.c csys_sendto function, allowing authenticated local attackers to cause denial of service and potentially achieve code execution with high integrity impact. The vulnerability requires local access and valid credentials but exploits a memory safety flaw in a core system call handler that could be leveraged for privilege escalation or system instability in embedded/IoT deployments running RT-Thread.

Denial Of Service Rt Thread
NVD GitHub VulDB
CVSS 3.1
8.0
EPSS
0.5%
CVE-2025-5866 HIGH POC This Week

A security vulnerability in A vulnerability classified as critical (CVSS 8.0). Risk factors: public PoC available.

Buffer Overflow Privilege Escalation Rt Thread
NVD GitHub VulDB
CVSS 3.1
8.0
EPSS
0.4%
CVE-2025-5865 HIGH POC This Week

Critical memory corruption vulnerability in RT-Thread 5.1.0's sys_select syscall handler that allows authenticated local attackers to corrupt kernel memory by manipulating the timeout parameter. The vulnerability affects the lwp (lightweight process) component and has a CVSS score of 8.0 with potential for code execution, information disclosure, and denial of service. No public exploit code or active in-the-wild exploitation has been confirmed at this time, but the critical severity rating and memory corruption nature warrant immediate patching.

Buffer Overflow Rt Thread
NVD GitHub VulDB
CVSS 3.1
8.0
EPSS
0.5%
CVE-2025-1115 MEDIUM POC This Month

A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Rated medium severity (CVSS 4.8), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Rt Thread
NVD GitHub VulDB
CVSS 4.0
4.8
EPSS
0.1%
CVE-2025-6693
EPSS 0% CVSS 7.8
HIGH POC This Week

A vulnerability, which was classified as critical, was found in RT-Thread up to 5.1.0. This affects the function sys_device_open/sys_device_read/sys_device_control/sys_device_init/sys_device_close/sys_device_write of the file components/drivers/core/device.c. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way.

Buffer Overflow Rt Thread
NVD GitHub VulDB
CVE-2025-5869
EPSS 0% CVSS 8.0
HIGH POC This Week

Critical memory corruption vulnerability in RT-Thread 5.1.0's sys_recvfrom syscall handler that allows authenticated local attackers to corrupt kernel memory through improper argument validation. An attacker with local access and limited privileges can exploit this to achieve arbitrary code execution or denial of service, potentially compromising the entire embedded system running RT-Thread.

Buffer Overflow Rt Thread
NVD GitHub VulDB
CVE-2025-5868
EPSS 0% CVSS 8.0
HIGH POC This Week

Critical array index validation vulnerability in RT-Thread 5.1.0's signal mask syscall handler that allows authenticated local attackers to read and modify kernel memory with high impact. The vulnerability exists in the sys_thread_sigprocmask function where improper validation of the 'how' parameter enables out-of-bounds array access, potentially leading to privilege escalation or denial of service. This is an actively exploitable vulnerability requiring local access and low privileges with no user interaction needed.

Information Disclosure Rt Thread
NVD GitHub VulDB
CVE-2025-5867
EPSS 0% CVSS 8.0
HIGH POC This Week

Critical null pointer dereference vulnerability in RT-Thread 5.1.0's lwp_syscall.c csys_sendto function, allowing authenticated local attackers to cause denial of service and potentially achieve code execution with high integrity impact. The vulnerability requires local access and valid credentials but exploits a memory safety flaw in a core system call handler that could be leveraged for privilege escalation or system instability in embedded/IoT deployments running RT-Thread.

Denial Of Service Rt Thread
NVD GitHub VulDB
CVE-2025-5866
EPSS 0% CVSS 8.0
HIGH POC This Week

A security vulnerability in A vulnerability classified as critical (CVSS 8.0). Risk factors: public PoC available.

Buffer Overflow Privilege Escalation Rt Thread
NVD GitHub VulDB
CVE-2025-5865
EPSS 0% CVSS 8.0
HIGH POC This Week

Critical memory corruption vulnerability in RT-Thread 5.1.0's sys_select syscall handler that allows authenticated local attackers to corrupt kernel memory by manipulating the timeout parameter. The vulnerability affects the lwp (lightweight process) component and has a CVSS score of 8.0 with potential for code execution, information disclosure, and denial of service. No public exploit code or active in-the-wild exploitation has been confirmed at this time, but the critical severity rating and memory corruption nature warrant immediate patching.

Buffer Overflow Rt Thread
NVD GitHub VulDB
CVE-2025-1115
EPSS 0% CVSS 4.8
MEDIUM POC This Month

A vulnerability classified as problematic was found in RT-Thread up to 5.1.0. Rated medium severity (CVSS 4.8), this vulnerability is low attack complexity. Public exploit code available and no vendor patch available.

Information Disclosure Rt Thread
NVD GitHub VulDB

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy