Description
Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution.
Published: 2026-02-09
Score: 9.8 Critical
EPSS: < 1% Very Low
KEV: No
Impact: Remote Code Execution
Action: Immediate Patch
AI Analysis

Impact

The vulnerability is caused by improper length handling when parsing multiple cookie fields, including TRACKID, in the lighttpd web server. An unauthenticated attacker can send oversized cookie values that overflow a stack buffer, which can lead to a denial‑of‑service and, in the worst case, allow remote code execution. This flaw is identified as a stack-based buffer overflow (CWE‑121).

Affected Systems

The affected systems are devices manufactured by WAGO, specifically model series 0852‑1322 and 0852‑1328. No specific firmware or software versions are listed in the vendor advisory, so all current releases of these models that incorporate the vulnerable lighttpd component are potentially impacted.

Risk and Exploitability

The CVSS score of 9.8 indicates a critical level of severity, while the EPSS score of less than 1% suggests that the probability of exploitation at this time is low. The vulnerability is not yet listed in the CISA Known Exploited Vulnerabilities catalog. Based on the description, the likely attack vector is over the network: an attacker crafts an HTTP request containing oversized cookie fields and sends it to the affected lighttpd instance. No authentication is required, so the threat can be launched remotely against any system that is reachable and is using the vulnerable software component. This makes the risk high, especially if the device is exposed to the internet or an untrusted network.

Generated by OpenCVE AI on April 17, 2026 at 21:32 UTC.

Remediation

No vendor fix or workaround currently provided.

OpenCVE Recommended Actions

  • Upgrade the device firmware or lighttpd component to a version that includes the stack length check fix provided by WAGO.
  • If an immediate firmware update is not available, deploy a network perimeter filter (IDS/IPS or reverse proxy) to block HTTP requests with cookie fields that exceed the allowed size, thereby preventing the overflow trigger.
  • Disable, if permissible, HTTP cookie support or truncate cookie values at the application or proxy layer to eliminate the overwrite condition.
  • Monitor system logs for abnormal cookie size patterns and investigate any repeated attempts to trigger the overflow condition.

Generated by OpenCVE AI on April 17, 2026 at 21:32 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Tue, 10 Feb 2026 12:45:00 +0000

Type Values Removed Values Added
First Time appeared Wago
Wago 0852-1322
Wago 0852-1328
Vendors & Products Wago
Wago 0852-1322
Wago 0852-1328

Tue, 10 Feb 2026 12:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'yes', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 09 Feb 2026 08:00:00 +0000

Type Values Removed Values Added
Description Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution.
Title Stack Overflow via Oversized Cookie Fields in lighttpd
Weaknesses CWE-121
References
Metrics cvssV3_1

{'score': 9.8, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H'}


Subscriptions

Wago 0852-1322 0852-1328
cve-icon MITRE

Status: PUBLISHED

Assigner: CERTVDE

Published:

Updated: 2026-02-09T15:34:53.334Z

Reserved: 2026-01-13T08:33:25.683Z

Link: CVE-2026-22904

cve-icon Vulnrichment

Updated: 2026-02-09T15:34:45.941Z

cve-icon NVD

Status : Deferred

Published: 2026-02-09T08:16:11.387

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22904

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-17T21:45:28Z

Weaknesses