Vulnerabilities
Vulnerable Software
Gnu:  >> Wget2  Security Vulnerabilities
A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.
CVSS Score
7.6
EPSS Score
0.001
Published
2026-01-09
A security issue was discovered in GNU Wget2 when handling Metalink documents. The application fails to properly validate file paths provided in Metalink <file name> elements. An attacker can abuse this behavior to write files to unintended locations on the system. This can lead to data loss or potentially allow further compromise of the user’s environment.
CVSS Score
8.8
EPSS Score
0.0
Published
2026-01-09


Contact Us

Shodan ® - All rights reserved