CVE-2025-51823

MEDIUM

Libcsp - Buffer Overflow

Title source: rule
STIX 2.1

Description

libcsp 2.0 is vulnerable to Buffer Overflow in the csp_eth_init() function due to improper handling of the ifname parameter. The function uses strcpy to copy the interface name into a structure member (ctx->name) without validating the input length.

References (2)

Core 2

Scores

CVSS v3 6.5
EPSS 0.0004
EPSS Percentile 13.5%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N

CISA SSVC

Vulnrichment
Exploitation none
Automatable no
Technical Impact partial

Details

CWE
CWE-120
Status published
Products (1)
libcsp/libcsp 2.0
Published Aug 11, 2025
Tracked Since Feb 18, 2026