Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-42361 | A double-free vulnerability exists in the IP header loopback parsing functionality of Weston Embedded uC-TCP-IP v3.06.01. A specially crafted set of network packets can lead to memory corruption, potentially resulting in code execution. An attacker can send a sequence of unauthenticated packets to trigger this vulnerability. |
Tue, 04 Nov 2025 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Wed, 12 Feb 2025 19:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Weston-embedded
Weston-embedded uc-tcp-ip |
|
| CPEs | cpe:2.3:a:weston-embedded:uc-tcp-ip:3.06.01:*:*:*:*:*:*:* | |
| Vendors & Products |
Weston-embedded
Weston-embedded uc-tcp-ip |
Status: PUBLISHED
Assigner: talos
Published:
Updated: 2025-11-04T18:15:51.871Z
Reserved: 2023-08-03T21:04:53.424Z
Link: CVE-2023-38562
Updated: 2024-08-02T17:46:55.845Z
Status : Modified
Published: 2024-02-20T15:15:08.020
Modified: 2025-11-04T19:15:50.720
Link: CVE-2023-38562
No data.
OpenCVE Enrichment
No data.
EUVD