Buffer Overflow in the URI parser of CivetWeb 1.14 through 1.16 (latest) allows a remote attacker to achieve remote code execution via a crafted HTTP request. This vulnerability is triggered during request processing and may allow an attacker to corrupt heap memory, potentially leading to denial of service or arbitrary code execution.
References
Link | Resource |
---|---|
https://github.com/civetweb/civetweb | Product |
https://github.com/krispybyte/CVE-2025-55763 | Exploit Third Party Advisory |
Configurations
History
09 Sep 2025, 13:57
Type | Values Removed | Values Added |
---|---|---|
First Time |
Civetweb Project civetweb
Civetweb Project |
|
References | () https://github.com/civetweb/civetweb - Product | |
References | () https://github.com/krispybyte/CVE-2025-55763 - Exploit, Third Party Advisory | |
CPE | cpe:2.3:a:civetweb_project:civetweb:*:*:*:*:*:*:*:* |
29 Aug 2025, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-08-29 17:15
Updated : 2025-09-09 13:57
NVD link : CVE-2025-55763
Mitre link : CVE-2025-55763
CVE.ORG link : CVE-2025-55763
JSON object : View
Products Affected
civetweb_project
- civetweb
CWE
CWE-121
Stack-based Buffer Overflow