Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-25390: n/a

0
High
VulnerabilityCVE-2024-25390cvecve-2024-25390
Published: Wed Mar 27 2024 (03/27/2024, 00:00:00 UTC)
Source: CVE Database V5

Description

A heap buffer overflow occurs in finsh/msh_file.c and finsh/msh.c in RT-Thread through 5.0.2.

AI-Powered Analysis

AILast updated: 11/04/2025, 18:59:01 UTC

Technical Analysis

CVE-2024-25390 is a heap-based buffer overflow vulnerability identified in the RT-Thread real-time operating system, specifically within the finsh shell components (finsh/msh_file.c and finsh/msh.c) up to version 5.0.2. The vulnerability arises due to improper handling of memory buffers during shell command processing, leading to out-of-bounds writes on the heap (classified under CWE-122). This flaw can be triggered by an attacker with local access to the device running RT-Thread, without requiring any privileges or user interaction, making it relatively easy to exploit in environments where local access is possible. Successful exploitation can result in arbitrary code execution, allowing attackers to escalate privileges, manipulate system behavior, or cause a denial of service by crashing the system. The CVSS v3.1 base score of 8.4 reflects the high impact on confidentiality, integrity, and availability, combined with low attack complexity and no required privileges or user interaction. Although no public exploits have been reported yet, the vulnerability poses a significant risk to embedded systems and IoT devices relying on RT-Thread, which is widely used in industrial control, consumer electronics, and smart devices. The lack of available patches at the time of publication necessitates immediate defensive measures to mitigate risk.

Potential Impact

For European organizations, the impact of CVE-2024-25390 is substantial, especially those deploying RT-Thread in critical embedded systems such as industrial automation, smart manufacturing, automotive electronics, and IoT infrastructure. Exploitation could lead to unauthorized control over devices, data leakage, disruption of operational technology (OT) environments, and potential cascading failures in interconnected systems. This could affect confidentiality by exposing sensitive operational data, integrity by allowing manipulation of device functions, and availability by causing device crashes or reboots. Given Europe's strong industrial base and increasing adoption of IoT and embedded technologies, the vulnerability could disrupt manufacturing processes, supply chains, and critical infrastructure. Additionally, the local access requirement means attackers might leverage insider threats or compromised internal networks to exploit the flaw, increasing the risk in environments with less stringent physical or network access controls.

Mitigation Recommendations

To mitigate CVE-2024-25390, European organizations should immediately implement strict access controls to limit local access to devices running RT-Thread, including physical security measures and network segmentation to isolate vulnerable devices. Monitoring and logging should be enhanced to detect unusual shell activity or memory corruption indicators. Organizations should audit their RT-Thread deployments to identify affected versions and prioritize upgrades once patches become available. In the interim, disabling or restricting the finsh shell functionality where feasible can reduce the attack surface. Employing runtime protections such as stack canaries, address space layout randomization (ASLR), and memory protection units (MPUs) in embedded environments may help mitigate exploitation impact. Vendors and integrators should be engaged to accelerate patch development and deployment. Finally, incident response plans should be updated to address potential exploitation scenarios involving embedded RT-Thread devices.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2024-02-07T00:00:00.000Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 690a475f6d939959c8022d9b

Added to database: 11/4/2025, 6:35:11 PM

Last enriched: 11/4/2025, 6:59:01 PM

Last updated: 12/20/2025, 7:43:33 AM

Views: 25

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats