Vulnerability Description
In NextX Duo before 6.4.4, in the HTTP client module, the network support code for Eclipse Foundation ThreadX, the parsing of HTTP header fields was missing bounds verification. A crafted server response could cause undefined behavior.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Eclipse | Threadx Netx Duo | < 6.4.4.202503 |
Related Weaknesses (CWE)
References
- https://github.com/eclipse-threadx/netxduo/security/advisories/GHSA-9c77-rgp9-c2ExploitVendor Advisory
FAQ
What is CVE-2025-55085?
CVE-2025-55085 is a vulnerability with a CVSS score of 7.5 (HIGH). In NextX Duo before 6.4.4, in the HTTP client module, the network support code for Eclipse Foundation ThreadX, the parsing of HTTP header fields was missing bounds verification. A crafted server respo...
How severe is CVE-2025-55085?
CVE-2025-55085 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2025-55085?
Check the references section above for vendor advisories and patch information. Affected products include: Eclipse Threadx Netx Duo.