VYPR
Unrated severityNVD Advisory· Published Oct 17, 2025· Updated Oct 20, 2025

Web http client: Unchecked Server-Side Malicious Packet Issue

CVE-2025-55085

Description

In NextX Duo before 6.4.4, in the HTTP client module, the network support code for Eclipse Foundation ThreadX, the parsing of HTTP header fields was missing bounds verification. A crafted server response could cause undefined behavior.

Affected products

2
  • NextX/Duollm-create
    Range: <6.4.4
  • Eclipse Foundation/NetX Duov5
    Range: 0

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

1

News mentions

0

No linked articles in our index yet.