CVE-2025-6693
Unknown Unknown - Not Provided
BaseFortify

Publication date: 2025-06-26

Last updated on: 2025-07-11

Assigner: VulDB

Description
A vulnerability, which was classified as critical, was found in RT-Thread up to 5.1.0. This affects the function sys_device_open/sys_device_read/sys_device_control/sys_device_init/sys_device_close/sys_device_write of the file components/drivers/core/device.c. The manipulation leads to memory corruption. It is possible to launch the attack on the local host. The vendor was contacted early about this disclosure but did not respond in any way.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2025-06-26
Last Modified
2025-07-11
Generated
2026-05-07
AI Q&A
2025-06-26
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
rt-thread rt-thread to 5.1.0 (inc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-119 The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

CVE-2025-6693 is a critical vulnerability in RT-Thread version 5.1.0 affecting multiple device-related system calls such as sys_device_open, sys_device_read, sys_device_control, sys_device_init, sys_device_close, and sys_device_write. The root cause is improper handling and insufficient validation of function pointers passed as parameters in these calls. This flaw allows a local attacker, particularly a compromised user thread, to hijack the control flow of the system by corrupting these pointers, leading to memory corruption. Exploiting this vulnerability can result in arbitrary code execution and privilege escalation, enabling the attacker to gain elevated privileges and potentially fully compromise the system. [1, 2, 3, 4, 5, 6, 7, 8]


How can this vulnerability impact me? :

This vulnerability can have severe impacts including arbitrary code execution in kernel space, privilege escalation from user-level to kernel-level privileges, and full system compromise. An attacker exploiting this flaw can bypass security mechanisms, access sensitive data, install persistent malware, disable security features, and take complete control over the affected system. Since the vulnerability requires local access, a compromised user thread can leverage it to escalate privileges and control the system. [1, 2, 3, 4, 5, 6, 7, 8]


How can this vulnerability be detected on my network or system? Can you suggest some commands?

This vulnerability is a local memory corruption and control flow hijacking issue in RT-Thread version 5.1.0 affecting device system calls. Detection involves checking for abnormal behavior or crashes related to device operations such as sys_device_open, sys_device_read, sys_device_control, sys_device_init, sys_device_close, and sys_device_write. Since the vulnerability arises from improper pointer validation in kernel space, direct network detection is not applicable. On the system, detection could involve monitoring for unexpected privilege escalations or kernel crashes. Specific commands to detect this vulnerability are not provided in the available resources. However, reviewing the RT-Thread kernel logs for anomalies during device operations or using debugging tools to trace calls to the affected sys_device_* functions might help identify exploitation attempts.


What immediate steps should I take to mitigate this vulnerability?

Immediate mitigation steps include: 1) Implement thorough validation of function pointers before their invocation in the affected sys_device_* functions to prevent control flow hijacking. 2) Add integrity checks for the device structure to ensure pointers like dev->ops->control, dev->ops->open, dev->ops->read, etc., are valid and not corrupted. 3) Deploy Control Flow Integrity (CFI) mechanisms to protect against unauthorized control flow changes. 4) Introduce bounds checking and safe pointer dereferencing to prevent invalid memory access. 5) Since no patches or vendor responses are available, consider replacing the affected RT-Thread version 5.1.0 with a secure alternative or updated version if available. 6) Restrict local access to trusted users only, as exploitation requires local access. These steps are recommended based on the technical analysis and mitigation advice provided in the resources. [6, 7, 8]


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart