CVE-2026-22903 PUBLISHED

Stack Overflow via SESSIONID Cookie in lighttpd

Assigner: CERTVDE
Reserved: 13.01.2026 Published: 09.02.2026 Updated: 09.02.2026

An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code execution due to missing stack protections.

Metrics

CVSS Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVSS Score: 9.8

Product Status

Vendor WAGO
Product 0852-1322
Versions Default: unaffected
  • affected from 0.0.0 to 2.64 (incl.)
Vendor WAGO
Product 0852-1328
Versions Default: unaffected
  • affected from 0.0.0 to 2.64 (incl.)
Vendor WAGO
Product 0852-1322
Versions Default: unaffected
  • Version 2.64 is affected
Vendor WAGO
Product 0852-1328
Versions Default: unaffected
  • Version 2.64 is affected

Credits

  • Diconium finder

References

Problem Types

  • CWE-121 Stack-based Buffer Overflow CWE