webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request. This is due to the filename variable
References
| Link | Resource |
|---|---|
| https://gist.github.com/Err0rzz/3afe49f54e1121b8a08a69801b61cfcc | Exploit Third Party Advisory |
| https://github.com/ourway/webfsd | Product |
Configurations
History
No history.
Information
Published : 2026-02-12 20:16
Updated : 2026-02-18 19:53
NVD link : CVE-2025-70314
Mitre link : CVE-2025-70314
CVE.ORG link : CVE-2025-70314
JSON object : View
Products Affected
ourway
- webfsd
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
