CVE-2025-67433
Published: 12 February 2026
Summary
CVE-2025-67433 is a high-severity Heap-based Buffer Overflow (CWE-122) vulnerability in Sourceforge (inferred from references). Its CVSS base score is 7.5 (High).
Operationally, exploitation aligns with the MITRE ATT&CK technique Exploit Public-Facing Application (T1190); ranked at the 17.5th percentile by exploit likelihood (below the median); it is not currently listed in the CISA KEV catalog.
Threat & Defense at a Glance
Threat & Defense Details
MITRE ATT&CK Enterprise TechniquesAI
Why these techniques?
Direct remote exploitation of public-facing TFTP server via crafted packet to trigger application DoS through buffer overflow.
NVD Description
A heap buffer overflow in the processRequest function of Open TFTP Server MultiThreaded v1.7 allows attackers to cause a Denial of Service (DoS) via a crafted DATA packet.
Deeper analysisAI
CVE-2025-67433 is a heap buffer overflow vulnerability (CWE-122) in the processRequest function of Open TFTP Server MultiThreaded version 1.7. The flaw affects this TFTP server implementation, enabling attackers to trigger a Denial of Service (DoS) condition through a specially crafted DATA packet. Published on 2026-02-12, it carries a CVSS v3.1 base score of 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H), indicating high severity due to its potential for remote disruption.
Any unauthenticated attacker with network access to the vulnerable TFTP server can exploit this issue with low complexity and no user interaction required. By sending a malicious DATA packet, the attacker causes a heap buffer overflow, crashing the server process and rendering the TFTP service unavailable. Exploitation is straightforward over the network, targeting availability without impacting confidentiality or integrity.
Advisories and related details are available via GitHub gists at https://gist.github.com/Hyobin/f1b7d48d29e60a378bb9c88ba8b8080a and https://gist.github.com/transparencybeam/f1b7d48d29e60a378bb9c88ba8b8080a, with the project hosted on SourceForge at https://sourceforge.net/projects/tftp-server/files/tftp%20server%20multithreaded/. Security practitioners should review these for proof-of-concept details and check for updates or patches on the project page.
Details
- CWE(s)