Wget2: gnu wget2: memory corruption and crash via filename sanitization logic with attacker-controlled urls
A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.
Problem Types
| Type | CWE ID | Description |
|---|
| CWE | CWE-121 | Stack-based Buffer Overflow |
Type: CWE
Description: Stack-based Buffer Overflow
Metrics
| Version | Base score | Base severity | Vector |
|---|
| 3.1 | 7.6 | HIGH | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H |
Version: 3.1
Base score: 7.6
Base severity: HIGH
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H
Metrics Other Info
Red Hat severity rating
namespace:
https://access.redhat.com/security/updates/classification/
Timeline
| Event | Date |
|---|
| Reported to Red Hat. | 2025-12-29 13:50:10 |
| Made public. | 2025-12-29 00:00:00 |
Event: Reported to Red Hat.
Date: 2025-12-29 13:50:10
Event: Made public.
Date: 2025-12-29 00:00:00