Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
No advisories yet.
| Link | Providers |
|---|---|
| https://certvde.com/de/advisories/VDE-2026-004 |
|
Tue, 10 Feb 2026 12:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Wago
Wago 0852-1322 Wago 0852-1328 |
|
| Vendors & Products |
Wago
Wago 0852-1322 Wago 0852-1328 |
Tue, 10 Feb 2026 12:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Mon, 09 Feb 2026 08:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible remote code execution. | |
| Title | Stack Overflow via Oversized Cookie Fields in lighttpd | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
cvssV3_1
|
Status: PUBLISHED
Assigner: CERTVDE
Published:
Updated: 2026-02-09T15:34:53.334Z
Reserved: 2026-01-13T08:33:25.683Z
Link: CVE-2026-22904
Updated: 2026-02-09T15:34:45.941Z
Status : Deferred
Published: 2026-02-09T08:16:11.387
Modified: 2026-04-15T00:35:42.020
Link: CVE-2026-22904
No data.
OpenCVE Enrichment
Updated: 2026-04-17T21:45:28Z