CVE-2025-70314

Critical
|9.8
No Exploit

Plain English Summary

AI-powered analysis for quick understanding

This vulnerability allows an attacker to execute arbitrary code on the server by sending a specially crafted request that overflows a buffer related to the filename variable. The attacker needs to be able to send requests to the webfsd service, making it a serious risk for any exposed system running version 1.21.

Technical Description

webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request. This is due to the filename variable

CVSS Vector Analysis

Attack VectorNetwork
Attack ComplexityLow
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactHigh
Integrity ImpactHigh
Availability ImpactHigh
ScopeUnchanged

Vector String

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$13,000($5K-$15K)
Vendor Response
Grade APatched in 5 days

Quick Information

Published

Feb 12, 2026

8 days ago

Last Modified

Feb 18, 2026

2 days ago

Vendor

ourway

Product

webfsd