{"id":"CVE-2023-28379","details":"A memory corruption vulnerability exists in the HTTP Server form boundary functionality of Weston Embedded uC-HTTP v3.01.01. A specially crafted network packet can lead to code execution. An attacker can send a malicious packet to trigger this vulnerability.","modified":"2026-04-11T12:45:06.224984Z","published":"2023-11-14T10:15:27.540Z","database_specific":{"unresolved_ranges":[{"extracted_events":[{"last_affected":"3.07.01"}],"cpe":"cpe:2.3:a:weston-embedded:cesium_net:3.07.01:*:*:*:*:*:*:*","source":"CPE_FIELD"}]},"references":[{"type":"WEB","url":"https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1738"},{"type":"EVIDENCE","url":"https://talosintelligence.com/vulnerability_reports/TALOS-2023-1738"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/siliconlabs/gecko_sdk","events":[{"introduced":"0"},{"last_affected":"2ba59bf969e94a0544e73e501d876722790f7a89"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"4.3.1"}],"cpe":"cpe:2.3:a:silabs:gecko_software_development_kit:4.3.1:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["v4.2.0","v4.2.1","v4.2.2","v4.2.3","v4.3.0","v4.3.1"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28379.json"}},{"ranges":[{"type":"GIT","repo":"https://github.com/weston-embedded/uc-http","events":[{"introduced":"0"},{"last_affected":"66272f451b35abda4cb23a78c5d91dd04ab59ee8"}],"database_specific":{"extracted_events":[{"introduced":"0"},{"last_affected":"3.01.01"}],"cpe":"cpe:2.3:a:weston-embedded:uc-http:3.01.01:*:*:*:*:*:*:*","source":"CPE_FIELD"}}],"versions":["v3.01.00","v3.01.01"],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-28379.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H"}]}