CVE-2025-55763

Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution.
References
Link Resource
https://github.com/civetweb/civetweb Product
https://github.com/krispybyte/CVE-2025-55763 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:civetweb_project:civetweb:*:*:*:*:*:*:*:*

History

09 Sep 2025, 13:57

Type Values Removed Values Added
First Time Civetweb Project civetweb
Civetweb Project
References () https://github.com/civetweb/civetweb - () https://github.com/civetweb/civetweb - Product
References () https://github.com/krispybyte/CVE-2025-55763 - () https://github.com/krispybyte/CVE-2025-55763 - Exploit, Third Party Advisory
CPE cpe:2.3:a:civetweb_project:civetweb:*:*:*:*:*:*:*:*

29 Aug 2025, 17:15

Type Values Removed Values Added
New CVE

Information

Published : 2025-08-29 17:15

Updated : 2025-09-09 13:57


NVD link : CVE-2025-55763

Mitre link : CVE-2025-55763

CVE.ORG link : CVE-2025-55763


JSON object : View

Products Affected

civetweb_project

  • civetweb
CWE
CWE-121

Stack-based Buffer Overflow