A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 12 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weston-embedded
Weston-embedded uc-tcp-ip |
|
| CPEs | cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:* | |
| Vendors & Products |
Weston-embedded
Weston-embedded uc-tcp-ip |
Status: PUBLISHED
Assigner: talos
Published: 2024-02-20T14:45:02.733Z
Updated: 2024-08-21T14:08:48.788Z
Reserved: 2023-08-03T21:04:53.424Z
Link: CVE-2023-38562
Updated: 2024-08-02T17:46:55.845Z
Status : Analyzed
Published: 2024-02-20T15:15:08.020
Modified: 2025-02-12T18:51:08.283
Link: CVE-2023-38562
No data.