-
Byte Open Security
(ByteOS Network)
Log In
Sign Up
CVE Vulnerability Details :
CVE-2024-25395
PUBLISHED
More Info
Official Page
Assigner
-
mitre
Assigner Org ID
-
8254265b-2729-46b6-b9e3-3dfca2d5bfca
View Known Exploited Vulnerability (KEV) details
Published At
-
27 Mar, 2024 | 00:00
Updated At
-
04 Nov, 2025 | 18:29
Rejected At
-
▼
CVE Numbering Authority (CNA)
A buffer overflow occurs in utilities/rt-link/src/rtlink.c in RT-Thread through 5.0.2.
Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
n/a
Problem Types
Type
CWE ID
Description
text
N/A
n/a
Type:
text
CWE ID:
N/A
Description:
n/a
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://github.com/RT-Thread/rt-thread/issues/8289
N/A
https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt
N/A
https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/
N/A
https://seclists.org/fulldisclosure/2024/Mar/28
N/A
http://www.openwall.com/lists/oss-security/2024/03/05/1
mailing-list
Hyperlink:
https://github.com/RT-Thread/rt-thread/issues/8289
Resource:
N/A
Hyperlink:
https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt
Resource:
N/A
Hyperlink:
https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/
Resource:
N/A
Hyperlink:
https://seclists.org/fulldisclosure/2024/Mar/28
Resource:
N/A
Hyperlink:
http://www.openwall.com/lists/oss-security/2024/03/05/1
Resource:
mailing-list
▼
Authorized Data Publishers (ADP)
1.
CISA ADP Vulnrichment
Affected Products
Vendor
rtthread
Product
rtthread
CPEs
cpe:2.3:o:rtthread:rtthread:-:*:*:*:*:*:*:*
Default Status
unknown
Versions
Affected
From
-
through
5.0.2
(custom)
Problem Types
Type
CWE ID
Description
CWE
CWE-120
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Type:
CWE
CWE ID:
CWE-120
Description:
CWE-120 Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
Metrics
Version
Base score
Base severity
Vector
3.1
8.8
HIGH
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Version:
3.1
Base score:
8.8
Base severity:
HIGH
Vector:
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
2.
CVE Program Container
Affected Products
Metrics
Version
Base score
Base severity
Vector
Metrics Other Info
Impacts
CAPEC ID
Description
Solutions
Configurations
Workarounds
Exploits
Credits
Timeline
Event
Date
Replaced By
Rejected Reason
References
Hyperlink
Resource
https://github.com/RT-Thread/rt-thread/issues/8289
x_transferred
https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt
x_transferred
https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/
x_transferred
https://seclists.org/fulldisclosure/2024/Mar/28
x_transferred
http://www.openwall.com/lists/oss-security/2024/03/05/1
mailing-list
x_transferred
http://seclists.org/fulldisclosure/2024/Mar/28
N/A
Hyperlink:
https://github.com/RT-Thread/rt-thread/issues/8289
Resource:
x_transferred
Hyperlink:
https://github.com/hnsecurity/vulns/blob/main/HNS-2024-05-rt-thread.txt
Resource:
x_transferred
Hyperlink:
https://security.humanativaspa.it/multiple-vulnerabilities-in-rt-thread-rtos/
Resource:
x_transferred
Hyperlink:
https://seclists.org/fulldisclosure/2024/Mar/28
Resource:
x_transferred
Hyperlink:
http://www.openwall.com/lists/oss-security/2024/03/05/1
Resource:
mailing-list
x_transferred
Hyperlink:
http://seclists.org/fulldisclosure/2024/Mar/28
Resource:
N/A
Details not found