CVE-2026-22906
- EPSS 0.07%
- Veröffentlicht 09.02.2026 07:40:33
- Zuletzt bearbeitet 09.02.2026 16:08:35
User credentials are stored using AES‑ECB encryption with a hardcoded key. An unauthenticated remote attacker obtaining the configuration file can decrypt and recover plaintext usernames and passwords, especially when combined with the authentication...
CVE-2026-22905
- EPSS 0.1%
- Veröffentlicht 09.02.2026 07:40:17
- Zuletzt bearbeitet 09.02.2026 16:08:35
An unauthenticated remote attacker can bypass authentication by exploiting insufficient URI validation and using path traversal sequences (e.g., /js/../cgi-bin/post.cgi), gaining unauthorized access to protected CGI endpoints and configuration downlo...
CVE-2026-22904
- EPSS 0.17%
- Veröffentlicht 09.02.2026 07:40:00
- Zuletzt bearbeitet 09.02.2026 16:08:35
Improper length handling when parsing multiple cookie fields (including TRACKID) allows an unauthenticated remote attacker to send oversized cookie values and trigger a stack buffer overflow, resulting in a denial‑of‑service condition and possible re...
CVE-2026-22903
- EPSS 0.66%
- Veröffentlicht 09.02.2026 07:39:42
- Zuletzt bearbeitet 09.02.2026 16:08:35
An unauthenticated remote attacker can send a crafted HTTP request containing an overly long SESSIONID cookie. This can trigger a stack buffer overflow in the modified lighttpd server, causing it to crash and potentially enabling remote code executio...