A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-69195 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2425770 | Issue Tracking Third Party Advisory |
Configurations
History
No history.
Information
Published : 2026-01-09 08:15
Updated : 2026-03-05 20:12
NVD link : CVE-2025-69195
Mitre link : CVE-2025-69195
CVE.ORG link : CVE-2025-69195
JSON object : View
Products Affected
gnu
- wget2
CWE
CWE-121
Stack-based Buffer Overflow
