First published: Wed Mar 27 2024(Updated: )
A buffer overflow occurs in utilities/rt-link/src/rtlink.c in RT-Thread through 5.0.2.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
RT-Thread | <=5.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-25395 is classified as a high severity vulnerability due to the potential for buffer overflow exploitation.
To fix CVE-2024-25395, upgrade RT-Thread to a version later than 5.0.2 where the vulnerability is mitigated.
CVE-2024-25395 affects all versions of RT-Thread up to and including 5.0.2.
CVE-2024-25395 can be exploited through buffer overflow attacks, potentially allowing an attacker to execute arbitrary code.
Currently, there are no known workarounds for CVE-2024-25395; updating to a secure version is recommended.