CVE-2025-56353

In tinyMQTT commit 6226ade15bd4f97be2d196352e64dd10937c1962 (2024-02-18), a memory leak occurs due to the broker's failure to validate or reject malformed UTF-8 strings in topic filters. An attacker can exploit this by sending repeated subscription requests with arbitrarily large or invalid filter payloads. Each request causes memory to be allocated for the malformed topic filter, but the broker does not free the associated memory, leading to unbounded heap growth and potential denial of service under sustained attack.
References
Link Resource
https://github.com/JustDoIt0910/tinyMQTT/issues/19 Exploit Issue Tracking Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:justdoit0910:tinymqtt:2024-02-18:*:*:*:*:*:*:*

History

03 Feb 2026, 21:54

Type Values Removed Values Added
CPE cpe:2.3:a:justdoit0910:tinymqtt:2024-02-18:*:*:*:*:*:*:*
First Time Justdoit0910 tinymqtt
Justdoit0910
References () https://github.com/JustDoIt0910/tinyMQTT/issues/19 - () https://github.com/JustDoIt0910/tinyMQTT/issues/19 - Exploit, Issue Tracking, Third Party Advisory

Information

Published : 2026-01-20 16:16

Updated : 2026-02-03 21:54


NVD link : CVE-2025-56353

Mitre link : CVE-2025-56353

CVE.ORG link : CVE-2025-56353


JSON object : View

Products Affected

justdoit0910

  • tinymqtt
CWE
CWE-401

Missing Release of Memory after Effective Lifetime