To mitigate this issue, users should upgrade to the fixed version when available.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Mon, 04 May 2026 13:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:amazon:freertos-plus-tcp:*:*:*:*:*:*:*:* |
Thu, 30 Apr 2026 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Amazon
Amazon freertos-plus-tcp |
|
| Vendors & Products |
Amazon
Amazon freertos-plus-tcp |
Wed, 29 Apr 2026 22:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Wed, 29 Apr 2026 20:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Wed, 29 Apr 2026 19:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Insufficient option length validation in the IPv6 Router Advertisement parser in FreeRTOS-Plus-TCP before V4.2.6 and V4.4.1 allows an adjacent network actor to cause a denial of service (device crash) by sending a crafted Router Advertisement with a truncated PREFIX_INFORMATION option that is smaller than the expected structure size. To mitigate this issue, users should upgrade to the fixed version when available. | |
| Title | Out-of-Bounds Read in Router Advertisement Option Parser in FreeRTOS-Plus-TCP | |
| Weaknesses | CWE-125 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: AMZN
Published:
Updated: 2026-04-29T22:14:08.753Z
Reserved: 2026-04-29T14:27:51.904Z
Link: CVE-2026-7425
Updated: 2026-04-29T19:32:45.006Z
Status : Analyzed
Published: 2026-04-29T20:16:32.010
Modified: 2026-05-04T13:12:57.240
Link: CVE-2026-7425
No data.
OpenCVE Enrichment
Updated: 2026-04-30T08:15:31Z