No advisories yet.
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-004 |
|
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wago
Wago 0852-1322 Wago 0852-1328 |
|
| Vendors & Products |
Wago
Wago 0852-1322 Wago 0852-1328 |
Tue, 10 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution. | |
| Title | Stack Overflow via Oversized Cookie Fields in lighttpd | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-02-09T15:34:53.334Z
Reserved: 2026-01-13T08:33:25.683Z
Link: CVE-2026-22904
Updated: 2026-02-09T15:34:45.941Z
Status : Awaiting Analysis
Published: 2026-02-09T08:16:11.387
Modified: 2026-02-09T16:08:35.290
Link: CVE-2026-22904
No data.
OpenCVE Enrichment
Updated: 2026-02-10T12:23:50Z