A stack-based buffer overflow in the CLI's TFTP file‑transfer command handling allows a low-privileged attacker with Telnet/SSH access to trigger memory corruption by supplying unexpected or oversized filename input. Exploitation results in the corruption of the internal buffer, causing the CLI and web dashboard to become unavailable and leading to a denial of service.
References
| Link | Resource |
|---|---|
| https://certvde.com/de/advisories/VDE-2025-104 |
Configurations
No configuration.
History
No history.
Information
Published : 2026-03-18 08:16
Updated : 2026-03-18 14:52
NVD link : CVE-2026-22320
Mitre link : CVE-2026-22320
CVE.ORG link : CVE-2026-22320
JSON object : View
Products Affected
No product.
CWE
CWE-121
Stack-based Buffer Overflow
