Home
CRITICAL: 9.8 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HDefault status
unaffected
0.0.0 (semver)
affected
Default status
unaffected
0.0.0 (semver)
affected
Default status
unaffected
2.64
affected
Default status
unaffected
2.64
affected
Description
Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution.
Problem types
CWE-121 Stack-based Buffer Overflow
Product status
0.0.0 (semver)
0.0.0 (semver)
2.64
2.64
Credits
Diconium
References
certvde.com/de/advisories/VDE-2026-004