A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.
History

Fri, 09 Jan 2026 14:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 09 Jan 2026 13:30:00 +0000

Type Values Removed Values Added
First Time appeared Gnu
Gnu wget
Vendors & Products Gnu
Gnu wget

Fri, 09 Jan 2026 08:15:00 +0000

Type Values Removed Values Added
Title wget2: GNU Wget2: Memory corruption and crash via filename sanitization logic with attacker-controlled URLs Wget2: gnu wget2: memory corruption and crash via filename sanitization logic with attacker-controlled urls
References

Tue, 30 Dec 2025 00:15:00 +0000

Type Values Removed Values Added
Description A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.
Title wget2: GNU Wget2: Memory corruption and crash via filename sanitization logic with attacker-controlled URLs
Weaknesses CWE-121
References
Metrics threat_severity

None

cvssV3_1

{'score': 7.6, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:H'}

threat_severity

Important


cve-icon MITRE

Status: PUBLISHED

Assigner: fedora

Published: 2026-01-09T07:57:17.240Z

Updated: 2026-01-10T04:55:51.545Z

Reserved: 2025-12-29T13:49:33.180Z

Link: CVE-2025-69195

cve-icon Vulnrichment

Updated: 2026-01-09T13:50:44.664Z

cve-icon NVD

Status : Received

Published: 2026-01-09T08:15:58.147

Modified: 2026-01-09T08:15:58.147

Link: CVE-2025-69195

cve-icon Redhat

Severity : Important

Publid Date: 2025-12-29T00:00:00Z

Links: CVE-2025-69195 - Bugzilla