CVE-2026-2016 PUBLISHED

happyfish100 libfastcommon base64.c base64_decode stack-based overflow

Assigner: VulDB
Reserved: 05.02.2026 Published: 06.02.2026 Updated: 06.02.2026

A security vulnerability has been detected in happyfish100 libfastcommon up to 1.0.84. Affected by this vulnerability is the function base64_decode of the file src/base64.c. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The identifier of the patch is 82f66af3e252e3e137dba0c3891570f085e79adf. Applying a patch is the recommended action to fix this issue.

Metrics

CVSS Vector: CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:P
CVSS Score: 4.8

Product Status

Vendor happyfish100
Product libfastcommon
Versions
  • Version 1.0.0 is affected
  • Version 1.0.1 is affected
  • Version 1.0.2 is affected
  • Version 1.0.3 is affected
  • Version 1.0.4 is affected
  • Version 1.0.5 is affected
  • Version 1.0.6 is affected
  • Version 1.0.7 is affected
  • Version 1.0.8 is affected
  • Version 1.0.9 is affected
  • Version 1.0.10 is affected
  • Version 1.0.11 is affected
  • Version 1.0.12 is affected
  • Version 1.0.13 is affected
  • Version 1.0.14 is affected
  • Version 1.0.15 is affected
  • Version 1.0.16 is affected
  • Version 1.0.17 is affected
  • Version 1.0.18 is affected
  • Version 1.0.19 is affected
  • Version 1.0.20 is affected
  • Version 1.0.21 is affected
  • Version 1.0.22 is affected
  • Version 1.0.23 is affected
  • Version 1.0.24 is affected
  • Version 1.0.25 is affected
  • Version 1.0.26 is affected
  • Version 1.0.27 is affected
  • Version 1.0.28 is affected
  • Version 1.0.29 is affected
  • Version 1.0.30 is affected
  • Version 1.0.31 is affected
  • Version 1.0.32 is affected
  • Version 1.0.33 is affected
  • Version 1.0.34 is affected
  • Version 1.0.35 is affected
  • Version 1.0.36 is affected
  • Version 1.0.37 is affected
  • Version 1.0.38 is affected
  • Version 1.0.39 is affected
  • Version 1.0.40 is affected
  • Version 1.0.41 is affected
  • Version 1.0.42 is affected
  • Version 1.0.43 is affected
  • Version 1.0.44 is affected
  • Version 1.0.45 is affected
  • Version 1.0.46 is affected
  • Version 1.0.47 is affected
  • Version 1.0.48 is affected
  • Version 1.0.49 is affected
  • Version 1.0.50 is affected
  • Version 1.0.51 is affected
  • Version 1.0.52 is affected
  • Version 1.0.53 is affected
  • Version 1.0.54 is affected
  • Version 1.0.55 is affected
  • Version 1.0.56 is affected
  • Version 1.0.57 is affected
  • Version 1.0.58 is affected
  • Version 1.0.59 is affected
  • Version 1.0.60 is affected
  • Version 1.0.61 is affected
  • Version 1.0.62 is affected
  • Version 1.0.63 is affected
  • Version 1.0.64 is affected
  • Version 1.0.65 is affected
  • Version 1.0.66 is affected
  • Version 1.0.67 is affected
  • Version 1.0.68 is affected
  • Version 1.0.69 is affected
  • Version 1.0.70 is affected
  • Version 1.0.71 is affected
  • Version 1.0.72 is affected
  • Version 1.0.73 is affected
  • Version 1.0.74 is affected
  • Version 1.0.75 is affected
  • Version 1.0.76 is affected
  • Version 1.0.77 is affected
  • Version 1.0.78 is affected
  • Version 1.0.79 is affected
  • Version 1.0.80 is affected
  • Version 1.0.81 is affected
  • Version 1.0.82 is affected
  • Version 1.0.83 is affected
  • Version 1.0.84 is affected

Credits

  • liloler (VulDB User) reporter

References

Problem Types

  • Stack-based Buffer Overflow CWE
  • Memory Corruption CWE