CVE-2025-56353
Published: 20 January 2026
Summary
CVE-2025-56353 is a high-severity Missing Release of Memory after Effective Lifetime (CWE-401) vulnerability in Justdoit0910 Tinymqtt. Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 21.6th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog; a public proof-of-concept is referenced.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Remote exploitation of public-facing MQTT broker via malformed subscriptions to trigger application-level resource exhaustion DoS.
NVD Description
In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), a memory leak occurs due to the broker's failure to validate or reject malformed UTF-8 strings in topic filters. An attacker can exploit this by sending repeated subscription requests with arbitrarily large or invalid filter…
more
payloads. Each request causes memory to be allocated for the malformed topic filter, but the broker does not free the associated memory, leading to unbounded heap growth and potential denial of service under sustained attack.
Deeper analysisAI
CVE-2025-56353 is a memory leak vulnerability in the tinyMQTT broker at commit 6226ade15bd4f97be2d196352e64dd10937c1962, dated 2024-02-18. The issue stems from the broker's failure to validate or reject malformed UTF-8 strings in topic filters, resulting in memory allocation for each malformed filter without subsequent deallocation. This affects the heap, as classified under CWE-401 (Memory Leak), with a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H).
A remote, unauthenticated attacker can exploit this vulnerability over the network with low complexity and no user interaction required. By sending repeated MQTT subscription requests containing arbitrarily large or invalid topic filter payloads, the attacker triggers ongoing memory allocation for each request. The broker does not free this memory, causing unbounded heap growth and eventual denial of service through resource exhaustion under sustained attack.
Mitigation details and further discussion are available in the GitHub issue at https://github.com/JustDoIt0910/tinyMQTT/issues/19. The vulnerability was published on 2026-01-20.
Details
- CWE(s)