Metrics
Affected Vendors & Products
Fri, 16 Jan 2026 21:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse paho Mqtt
|
|
| CPEs | cpe:2.3:a:eclipse:paho_mqtt:*:*:*:*:*:go:*:* | |
| Vendors & Products |
Eclipse paho Mqtt
|
|
| Metrics |
cvssV3_1
|
cvssV3_1
|
Wed, 17 Dec 2025 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | paho.mqtt.golang: paho.mqtt.golang: Integer Overflow in UTF-8 String Encoding | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Thu, 04 Dec 2025 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Eclipse
Eclipse paho Go Mqtt |
|
| Vendors & Products |
Eclipse
Eclipse paho Go Mqtt |
Tue, 02 Dec 2025 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 02 Dec 2025 08:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | In Eclipse Paho Go MQTT v3.1 library (paho.mqtt.golang) versions <=1.5.0 UTF-8 encoded strings, passed into the library, may be incorrectly encoded if their length exceeds 65535 bytes. This may lead to unexpected content in packets sent to the server (for example, part of an MQTT topic may leak into the message body in a PUBLISH packet). The issue arises because the length of the data passed in was converted from an int64/int32 (depending upon CPU) to an int16 without checks for overflows. The int16 length was then written, followed by the data (e.g. topic). This meant that when the data (e.g. topic) was over 65535 bytes then the amount of data written exceeds what the length field indicates. This could lead to a corrupt packet, or mean that the excess data leaks into another field (e.g. topic leaks into message body). | |
| Weaknesses | CWE-197 CWE-681 |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: eclipse
Published: 2025-12-02T08:18:16.724Z
Updated: 2025-12-02T13:55:51.665Z
Reserved: 2025-09-16T07:59:33.051Z
Link: CVE-2025-10543
Updated: 2025-12-02T13:55:44.730Z
Status : Analyzed
Published: 2025-12-02T09:15:46.127
Modified: 2026-01-16T21:22:24.750
Link: CVE-2025-10543