Severity: low 

Affected versions:

- Apache NuttX RTOS 6.22 before 12.9.0

Description:

Improper Restriction of Operations within the Bounds of a Memory Buffer 
vulnerability was discovered in Apache NuttX RTOS apps/exapmles/xmlrpc 
application. In this example application device stats structure that stored 
remotely provided parameters had hardcoded buffer size which could lead to 
buffer overflow. Structure members buffers were updated to valid size of 
CONFIG_XMLRPC_STRINGSIZE+1.

This issue affects Apache NuttX RTOS users that may have used or base their 
code on example application as presented in releases from 6.22 before 12.9.0.

Users of XMLRPC in Apache NuttX RTOS are advised to review their code 
for this pattern and update buffer sizes as presented in the version of 
the example in release 12.9.0.

Credit:

Chánh Phạm <[email protected]> (reporter)
Arnout Engelen <[email protected]> (remediation developer)
Tomek CEDRO <[email protected]> (coordinator)
Alan Carvalho de Assis <[email protected]> (remediation reviewer)
Alin Jerpelea <[email protected]> (remediation reviewer)
Lee, Lup Yuen <[email protected]> (remediation reviewer)
Xiang Xiao <[email protected]> (remediation reviewer)
JianyuWang <[email protected]> (remediation reviewer)

References:

https://github.com/apache/nuttx-apps/pull/3027
https://nuttx.apache.org
https://www.cve.org/CVERecord?id=CVE-2025-47869

Reply via email to