Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-q2gj-jpwc-8f46

Опубликовано: 09 янв. 2026
Источник: github
Github: Не прошло ревью
CVSS3: 7.6

Описание

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

EPSS

Процентиль: 24%
0.00078
Низкий

7.6 High

CVSS3

Дефекты

CWE-121

Связанные уязвимости

CVSS3: 7.6
ubuntu
7 дней назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
nvd
7 дней назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.

CVSS3: 7.6
debian
7 дней назад

A flaw was found in GNU Wget2. This vulnerability, a stack-based buffe ...

EPSS

Процентиль: 24%
0.00078
Низкий

7.6 High

CVSS3

Дефекты

CWE-121