libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.
Metrics
Affected Vendors & Products
References
History
Tue, 12 Aug 2025 12:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Libcsp Project
Libcsp Project libcsp |
|
Vendors & Products |
Libcsp Project
Libcsp Project libcsp |
Mon, 11 Aug 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-120 | |
Metrics |
cvssV3_1
|
Mon, 11 Aug 2025 19:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length. | |
References |
|

Status: PUBLISHED
Assigner: mitre
Published: 2025-08-11T00:00:00.000Z
Updated: 2025-08-11T19:27:14.575Z
Reserved: 2025-06-16T00:00:00.000Z
Link: CVE-2025-51823

Updated: 2025-08-11T19:26:42.078Z

Status : Received
Published: 2025-08-11T19:15:28.360
Modified: 2025-08-11T20:15:27.773
Link: CVE-2025-51823

No data.