Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-60876: n/a

0
Unknown
VulnerabilityCVE-2025-60876cvecve-2025-60876
Published: Mon Nov 10 2025 (11/10/2025, 00:00:00 UTC)
Source: CVE Database V5

Description

BusyBox wget thru 1.3.7 accepted raw CR (0x0D)/LF (0x0A) and other C0 control bytes in the HTTP request-target (path/query), allowing the request line to be split and attacker-controlled headers to be injected. To preserve the HTTP/1.1 request-line shape METHOD SP request-target SP HTTP/1.1, a raw space (0x20) in the request-target must also be rejected (clients should use %20).

AI-Powered Analysis

AILast updated: 11/10/2025, 20:24:02 UTC

Technical Analysis

CVE-2025-60876 is a vulnerability found in BusyBox wget versions up to 1.3.7, where the HTTP request-target component improperly accepts raw carriage return (0x0D), line feed (0x0A), and other C0 control characters. In HTTP/1.1, the request line follows the format METHOD SP request-target SP HTTP/1.1, where SP is a space character (0x20). BusyBox wget's failure to reject raw CR/LF and other control bytes in the request-target allows an attacker to split the request line into multiple lines, effectively injecting attacker-controlled HTTP headers. This can lead to HTTP request smuggling or header injection attacks, which may be leveraged to bypass security controls, poison caches, or manipulate backend server behavior. The vulnerability arises because the client accepts raw spaces in the request-target, which should be percent-encoded as %20 to maintain the request-line integrity. Although no CVSS score has been assigned, the flaw is significant because it undermines the fundamental HTTP request parsing logic. Exploitation requires an attacker to send malicious HTTP requests to a server or proxy using BusyBox wget, often embedded in IoT or constrained devices. The vulnerability is particularly concerning in environments where BusyBox wget is used for automated HTTP requests or proxying, as it can be exploited to inject malicious headers or smuggle requests past security devices. No known exploits are currently reported in the wild, and no patches have been linked yet, but the vulnerability is publicly disclosed and should be addressed promptly.

Potential Impact

For European organizations, the impact of CVE-2025-60876 can be substantial, especially for those relying on BusyBox wget in embedded systems, IoT devices, or network appliances. Successful exploitation can lead to HTTP request smuggling or header injection, which may allow attackers to bypass security controls such as web application firewalls, poison caches, or manipulate backend server behavior. This can result in unauthorized access, data leakage, or disruption of services. Industrial sectors using embedded Linux devices with BusyBox, such as manufacturing, energy, and telecommunications, are particularly at risk. The vulnerability could also be exploited to facilitate further attacks within internal networks if devices are reachable. Given the widespread use of BusyBox in constrained environments, the scope of affected systems is broad, increasing the potential attack surface. The absence of authentication requirements and the ability to trigger the flaw remotely via crafted HTTP requests heighten the risk. However, exploitation requires network access to the affected device and the ability to send specially crafted HTTP requests, which may limit exposure to internal or poorly segmented networks.

Mitigation Recommendations

European organizations should take the following specific mitigation steps: 1) Inventory and identify all devices and systems using BusyBox wget, particularly versions up to 1.3.7, focusing on embedded, IoT, and network appliances. 2) Monitor vendor advisories and apply patches or updated BusyBox versions as soon as they become available to address this vulnerability. 3) Implement strict input validation and filtering on HTTP requests at network boundaries, including rejecting or sanitizing requests containing raw CR, LF, or control characters in the request-target. 4) Deploy web application firewalls and intrusion detection systems configured to detect and block HTTP request smuggling or header injection attempts. 5) Segment networks to limit exposure of vulnerable devices to untrusted networks or the internet. 6) Conduct security assessments and penetration testing to identify potential exploitation paths involving BusyBox wget. 7) Educate security teams about the risks of HTTP request smuggling and header injection to improve detection and response capabilities. 8) Where possible, replace or upgrade embedded devices running outdated BusyBox versions with more secure alternatives.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.2
Assigner Short Name
mitre
Date Reserved
2025-09-26T00:00:00.000Z
Cvss Version
null
State
PUBLISHED

Threat ID: 6912465f941466772c506b6f

Added to database: 11/10/2025, 8:09:03 PM

Last enriched: 11/10/2025, 8:24:02 PM

Last updated: 11/12/2025, 4:10:47 AM

Views: 15

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats