CVE-2025-51823

libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
Configurations

Configuration 1 (hide)

cpe:2.3:a:libcsp:libcsp:2.0:*:*:*:*:*:*:*

History

14 Aug 2025, 16:24

Type Values Removed Values Added
References () https://github.com/libcsp/libcsp/issues/850 - () https://github.com/libcsp/libcsp/issues/850 - Third Party Advisory
References () https://github.com/libcsp/libcsp/pull/852 - () https://github.com/libcsp/libcsp/pull/852 - Patch
CPE cpe:2.3:a:libcsp:libcsp:2.0:*:*:*:*:*:*:*
First Time Libcsp
Libcsp libcsp

12 Aug 2025, 14:25

Type Values Removed Values Added
Summary
  • (es) libcsp 2.0 es vulnerable a desbordamiento de búfer en la función csp_eth_init() debido al manejo incorrecto del parámetro ifname. La función usa strcpy para copiar el nombre de la interfaz en un miembro de la estructura (ctx->name) sin validar la longitud de la entrada.

11 Aug 2025, 20:15

Type Values Removed Values Added
CWE CWE-120
CVSS v2 : unknown
v3 : unknown
v2 : unknown
v3 : 6.5

11 Aug 2025, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-11 19:15

Updated : 2025-08-14 16:24


NVD link : CVE-2025-51823

Mitre link : CVE-2025-51823

CVE.ORG link : CVE-2025-51823


JSON object : View

Products Affected

libcsp

  • libcsp
CWE
CWE-120

Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')