Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution.
References
| Link | Resource |
|---|---|
| https://github.com/civetweb/civetweb | Product |
| https://github.com/krispybyte/CVE-2025-55763 | Exploit Third Party Advisory |
Configurations
History
09 Sep 2025, 13:57
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Civetweb Project civetweb
Civetweb Project |
|
| References | () https://github.com/civetweb/civetweb - Product | |
| References | () https://github.com/krispybyte/CVE-2025-55763 - Exploit, Third Party Advisory | |
| CPE | cpe:2.3:a:civetweb_project:civetweb:*:*:*:*:*:*:*:* |
29 Aug 2025, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2025-08-29 17:15
Updated : 2025-09-09 13:57
NVD link : CVE-2025-55763
Mitre link : CVE-2025-55763
CVE.ORG link : CVE-2025-55763
JSON object : View
Products Affected
civetweb_project
- civetweb
CWE
CWE-121
Stack-based Buffer Overflow
