{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-20T16:53:48.919","vulnerabilities":[{"cve":{"id":"CVE-2025-70957","sourceIdentifier":"cve@mitre.org","published":"2026-02-13T22:16:10.413","lastModified":"2026-04-15T00:35:42.020","vulnStatus":"Deferred","cveTags":[],"descriptions":[{"lang":"en","value":"A Denial of Service (DoS) vulnerability was discovered in the TON Lite Server before v2024.09. The vulnerability arises from the handling of external arguments passed to locally executed \"get methods.\" An attacker can inject a constructed Continuation object (an internal TVM type) that is normally restricted within the VM. When the TVM executes this malicious continuation, it consumes excessive CPU resources while accruing disproportionately low virtual gas costs. This \"free\" computation allows an attacker to monopolize the Lite Server's processing power, significantly reducing its throughput and causing a denial of service for legitimate users acting through the gateway."},{"lang":"es","value":"Una vulnerabilidad de denegación de servicio (DoS) fue descubierta en el TON Lite Server antes de la v2024.09. La vulnerabilidad surge del manejo de argumentos externos pasados a 'get methods' ejecutados localmente. Un atacante puede inyectar un objeto Continuation construido (un tipo interno de TVM) que normalmente está restringido dentro de la VM. Cuando la TVM ejecuta esta continuación maliciosa, consume recursos excesivos de CPU mientras acumula costos de gas virtual desproporcionadamente bajos. Esta computación 'gratuita' permite a un atacante monopolizar la potencia de procesamiento del Lite Server, reduciendo significativamente su rendimiento y causando una denegación de servicio para usuarios legítimos que actúan a través de la pasarela."}],"metrics":{"cvssMetricV31":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H","baseScore":7.5,"baseSeverity":"HIGH","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"NONE","availabilityImpact":"HIGH"},"exploitabilityScore":3.9,"impactScore":3.6}]},"weaknesses":[{"source":"134c704f-9b21-4f2e-91b3-4a467353bcc0","type":"Secondary","description":[{"lang":"en","value":"CWE-674"}]}],"references":[{"url":"https://gist.github.com/Lucian-code233/d2589ece39914195c0e307b4dee32185","source":"cve@mitre.org"},{"url":"https://github.com/ton-blockchain/ton/commit/e35b34de22109596a54d1357dcce92d63002ba95","source":"cve@mitre.org"},{"url":"https://mp.weixin.qq.com/s/KT4RKNey_mjU2kBWpGTjuw","source":"cve@mitre.org"}]}}]}