An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections.
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-004 |
|
History
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wago
Wago 0852-1322 Wago 0852-1328 |
|
| Vendors & Products |
Wago
Wago 0852-1322 Wago 0852-1328 |
Mon, 09 Feb 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections. | |
| Title | Stack Overflow via SESSIONID Cookie in lighttpd | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-02-09T15:36:36.790Z
Reserved: 2026-01-13T08:33:25.683Z
Link: CVE-2026-22903
No data.
Status : Awaiting Analysis
Published: 2026-02-09T08:16:10.103
Modified: 2026-02-09T16:08:35.290
Link: CVE-2026-22903
No data.
OpenCVE Enrichment
Updated: 2026-02-10T12:23:51Z
Weaknesses