CVE-2025-55085
📊 8.8 HIGH⚡ 0.2%🎯 0 exploits
📅 Published Oct 17, 2025
📋 Status: Analyzed
In NextX Duo before 6.4.4, in the HTTP client module, the network support code for Eclipse Foundation ThreadX, the parsing of HTTP header fields was missing bounds verification. A crafted server response could cause undefined behavior.
CVSS v3.1 • NVD
🎯 Affected Products & Systems
1 product configurations affected
Filter by type:
| Type | Vendor | Product | Version Range | Status | CPE String |
|---|---|---|---|---|---|
📱App | eclipse | threadx netx duo | < 6.4.4.202503 | Vulnerable | cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:* |
📱
VulnerableApplication
Version: < 6.4.4.202503
CPE:
cpe:2.3:a:eclipse:threadx_netx_duo:*:*:*:*:*:*:*:*
Metrics
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:N/VI:H/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:X/R:X/V:X/RE:X/U:X
🔍 Technical Details
Analysis Status
AnalyzedCVSS Details
8.8 (HIGH)v4.0
Source: [email protected]
EPSS Details
0.2% (Minimal)38.4th percentile
Last updated: Nov 1, 2025
Exploitation probability within 30 days
Published Date
Oct 17, 2025 (16 days ago)
Last Modified
Oct 27, 2025 (6 days ago)
Security Weaknesses2
CWE-125CWE-1286
References1
NVD