Home

Description

Zervit's portable HTTP/web server is vulnerable to remote DoS attacks when a configuration reset request is made. The vulnerability is caused by inadequate validation of user-supplied input. An attacker can exploit this vulnerability by sending malicious requests. If the vulnerability is successfully exploited, the application can be made to stop responding, resulting in a DoS condition. It is possible to manually restart the application.

PUBLISHED Reserved 2025-12-01 | Published 2026-04-21 | Updated 2026-04-21 | Assigner INCIBE




HIGH: 8.2CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:L

Problem types

CWE-20 Improper input validation

Product status

Default status
unaffected

Any version
affected

Credits

Rafael Pedrero finder

References

www.incibe.es/...t-validation-zervit-portable-httpweb-server

cve.org (CVE-2025-13826)

nvd.nist.gov (CVE-2025-13826)

Download JSON