Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2025-7120 | Realchar version v0.0.4 is vulnerable to an unauthenticated denial of service (DoS) attack. The vulnerability exists in the file upload request handling, where appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request causes the server to continuously process each character. This leads to excessive resource consumption and renders the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service. |
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
Wed, 15 Oct 2025 13:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-400 |
Wed, 15 Oct 2025 13:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Wed, 15 Oct 2025 13:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Weaknesses | CWE-770 |
Thu, 20 Mar 2025 10:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Realchar version v0.0.4 is vulnerable to an unauthenticated denial of service (DoS) attack. The vulnerability exists in the file upload request handling, where appending characters, such as dashes (-), to the end of a multipart boundary in an HTTP request causes the server to continuously process each character. This leads to excessive resource consumption and renders the service unavailable. The issue is unauthenticated and does not require any user interaction, impacting all users of the service. | |
Title | Unauthenticated Denial of Service in shaunwei/realchar | |
Weaknesses | CWE-400 | |
References |
| |
Metrics |
cvssV3_0
|

Status: PUBLISHED
Assigner: @huntr_ai
Published:
Updated: 2025-10-15T12:49:23.701Z
Reserved: 2024-10-16T20:32:39.924Z
Link: CVE-2024-10051

Updated: 2025-03-20T17:50:31.957Z

Status : Awaiting Analysis
Published: 2025-03-20T10:15:14.490
Modified: 2025-10-15T13:15:33.950
Link: CVE-2024-10051

No data.

No data.