Impact
TinyWeb, a Delphi‑based HTTP/HTTPS server, allows an unauthenticated attacker to trigger a denial of service by sending a POST request whose Content‑Length header is exceptionally large. The server streams the incoming payload into memory without enforcing a maximum limit, allocating memory continuously for the body until system memory is exhausted and the process terminates. The weakness aligns with CWE‑400 (Uncontrolled Resource Consumption) and CWE‑770 (Allocation of Unbounded Resources).
Affected Systems
All hosts running TinyWeb versions earlier than 2.02 are vulnerable. The affected vendor is maximmasiutin (TinyWeb). The security advisory specifies that any deployment of TinyWeb before the 2.02 release is impacted.
Risk and Exploitability
The flaw achieves remote denial of service; no authentication is required. The CVSS base score is 8.7, indicating high severity. EPSS indicates a very low exploitation probability (<1 %), and the vulnerability is not listed in CISA’s KEV catalog, suggesting no known large‑scale attacks yet. Nevertheless, the remote attacker can easily send the crafted POST request to cause the server to crash, disrupting services until a reboot or reimplementation occurs.
OpenCVE Enrichment