Home

Description

EN DE

A vulnerability, which was classified as critical, has been found in qinguoyi TinyWebServer up to 1.0. Affected by this issue is some unknown functionality of the file /http/http_conn.cpp. The manipulation of the argument name/password leads to stack-based buffer overflow. The attack may be launched remotely. The exploit has been disclosed to the public and may be used.

Eine kritische Schwachstelle wurde in qinguoyi TinyWebServer bis 1.0 entdeckt. Betroffen davon ist ein unbekannter Prozess der Datei /http/http_conn.cpp. Mit der Manipulation des Arguments name/password mit unbekannten Daten kann eine stack-based buffer overflow-Schwachstelle ausgenutzt werden. Die Umsetzung des Angriffs kann dabei über das Netzwerk erfolgen. Der Exploit steht zur öffentlichen Verfügung.

PUBLISHED Reserved 2025-04-04 | Published 2025-04-04 | Updated 2025-04-04 | Assigner VulDB




MEDIUM: 6.9CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N
HIGH: 7.3CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
HIGH: 7.3CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L
7.5AV:N/AC:L/Au:N/C:P/I:P/A:P

Problem types

Stack-based Buffer Overflow

Memory Corruption

Product status

1.0
affected

Timeline

2025-04-04:Advisory disclosed
2025-04-04:VulDB entry created
2025-04-04:VulDB entry last update

Credits

s0l42 (VulDB User) reporter

References

magnificent-dill-351.notion.site/...18ed80229bbce911b3513054 exploit

vuldb.com/?id.303338 (VDB-303338 | qinguoyi TinyWebServer http_conn.cpp stack-based overflow) vdb-entry technical-description

vuldb.com/?ctiid.303338 (VDB-303338 | CTI Indicators (IOB, IOC, IOA)) signature permissions-required

vuldb.com/?submit.549227 (Submit #549227 | TinyWebServer 1.0 Stack-based Buffer Overflow) third-party-advisory

magnificent-dill-351.notion.site/...18ed80229bbce911b3513054 exploit

cve.org (CVE-2025-3266)

nvd.nist.gov (CVE-2025-3266)

Download JSON

Data based on CVE®. Copyright © 1999-2025, The MITRE Corporation. All rights reserved.