A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability.
Metrics
Affected Vendors & Products
References
History
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 12 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weston-embedded
Weston-embedded uc-tcp-ip |
|
| CPEs | cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:* | |
| Vendors & Products |
Weston-embedded
Weston-embedded uc-tcp-ip |
Status: PUBLISHED
Assigner: talos
Published: 2024-02-20T14:45:02.733Z
Updated: 2025-11-04T18:15:51.871Z
Reserved: 2023-08-03T21:04:53.424Z
Link: CVE-2023-38562
Updated: 2024-08-02T17:46:55.845Z
Status : Modified
Published: 2024-02-20T15:15:08.020
Modified: 2025-11-04T19:15:50.720
Link: CVE-2023-38562
No data.