A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.
Metrics
Affected Vendors & Products
References
History
Fri, 09 Jan 2026 14:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Fri, 09 Jan 2026 13:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Gnu
Gnu wget |
|
| Vendors & Products |
Gnu
Gnu wget |
Fri, 09 Jan 2026 08:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | wget2: GNU Wget2: Memory corruption and crash via filename sanitization logic with attacker-controlled URLs | Wget2: gnu wget2: memory corruption and crash via filename sanitization logic with attacker-controlled urls |
| References |
|
Tue, 30 Dec 2025 00:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities. | |
| Title | wget2: GNU Wget2: Memory corruption and crash via filename sanitization logic with attacker-controlled URLs | |
| Weaknesses | CWE-121 | |
| References |
| |
| Metrics |
threat_severity
|
cvssV3_1
|
Status: PUBLISHED
Assigner: fedora
Published: 2026-01-09T07:57:17.240Z
Updated: 2026-01-10T04:55:51.545Z
Reserved: 2025-12-29T13:49:33.180Z
Link: CVE-2025-69195
Updated: 2026-01-09T13:50:44.664Z
Status : Received
Published: 2026-01-09T08:15:58.147
Modified: 2026-01-09T08:15:58.147
Link: CVE-2025-69195