Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
Wed, 22 Apr 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Zervit portable Http/web Server
|
|
| Vendors & Products |
Zervit portable Http/web Server
|
Tue, 21 Apr 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Tue, 21 Apr 2026 09:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Zervit's portable HTTP/web server is vulnerable to remote DoS attacks when a configuration reset request is made. The vulnerability is caused by inadequate validation of user-supplied input. An attacker can exploit this vulnerability by sending malicious requests. If the vulnerability is successfully exploited, the application can be made to stop responding, resulting in a DoS condition. It is possible to manually restart the application. | |
| Title | Incorrect input validation on the Zervit portable HTTP/Web server | |
| First Time appeared |
Zervit
Zervit portable Http Web Server |
|
| Weaknesses | CWE-20 | |
| CPEs | cpe:2.3:a:zervit:portable_http_web_server:0:*:*:*:*:*:*:* | |
| Vendors & Products |
Zervit
Zervit portable Http Web Server |
|
| References |
| |
| Metrics |
cvssV4_0
|
Status: PUBLISHED
Assigner: INCIBE
Published:
Updated: 2026-04-21T13:23:30.712Z
Reserved: 2025-12-01T14:33:41.665Z
Link: CVE-2025-13826
Updated: 2026-04-21T13:23:23.370Z
Status : Awaiting Analysis
Published: 2026-04-21T09:16:06.087
Modified: 2026-04-21T16:20:24.180
Link: CVE-2025-13826
No data.
OpenCVE Enrichment
Updated: 2026-04-22T11:46:41Z