Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2025-69195: Stack-based Buffer Overflow

0
High
VulnerabilityCVE-2025-69195cvecve-2025-69195
Published: Fri Jan 09 2026 (01/09/2026, 07:57:17 UTC)
Source: CVE Database V5

Description

CVE-2025-69195 is a high-severity stack-based buffer overflow vulnerability in GNU Wget2 version 2. 1. 0. It arises from improper filename sanitization when processing attacker-controlled URL paths, especially with filename restriction options enabled. A remote attacker can exploit this by crafting a malicious URL that, when processed by a user running wget2, causes memory corruption leading to application crashes and potential further exploitation. The vulnerability requires no privileges but does require user interaction to trigger. Although no known exploits are currently active in the wild, the vulnerability poses significant risks to confidentiality, integrity, and availability. European organizations using wget2 2. 1. 0, particularly in automated download or scripting environments, should prioritize patching or mitigation.

AI-Powered Analysis

AILast updated: 01/16/2026, 09:55:13 UTC

Technical Analysis

CVE-2025-69195 is a stack-based buffer overflow vulnerability identified in GNU Wget2 version 2.1.0. The flaw exists in the filename sanitization logic that processes URL paths when filename restriction options are active. Specifically, when wget2 handles attacker-controlled URLs, the sanitization code fails to properly validate or limit the length of the filename derived from the URL path, leading to a buffer overflow on the stack. This memory corruption can cause the application to crash and potentially be leveraged by an attacker to execute arbitrary code or escalate privileges, although no public exploits are known at this time. The vulnerability is remotely exploitable without authentication but requires user interaction, such as running wget2 on a crafted URL. The CVSS 3.1 base score is 7.6, reflecting high severity with network attack vector, low attack complexity, no privileges required, but user interaction necessary. The impact affects confidentiality and integrity to a limited extent but availability is highly impacted due to potential crashes. The flaw was reserved late December 2025 and published in January 2026, indicating recent discovery. No patches or exploit code are currently publicly available, but the risk is significant for environments relying on wget2 for automated downloads or scripts processing untrusted URLs.

Potential Impact

For European organizations, this vulnerability poses a notable risk especially in sectors that rely heavily on GNU tools and open-source software, such as government agencies, research institutions, and critical infrastructure providers. The buffer overflow can lead to denial of service via application crashes, disrupting automated data retrieval processes and potentially causing operational downtime. More critically, if exploited for arbitrary code execution, attackers could gain footholds within internal networks, compromising sensitive data or integrity of systems. The requirement for user interaction limits mass exploitation but targeted phishing or social engineering campaigns could trick users into invoking wget2 with malicious URLs. Organizations using wget2 in automated pipelines without proper input validation are particularly vulnerable. The lack of known exploits currently provides a window for proactive mitigation, but the high CVSS score underscores the urgency. Confidentiality impact is limited but non-negligible if code execution is achieved. Overall, the vulnerability threatens availability and integrity primarily, with potential escalation to confidentiality breaches.

Mitigation Recommendations

1. Immediately audit all systems to identify usage of GNU Wget2 version 2.1.0, especially in automated scripts or user environments processing external URLs. 2. Avoid running wget2 on untrusted or unauthenticated URLs until a patched version is available. 3. Monitor official GNU Wget2 repositories and security advisories for patches addressing CVE-2025-69195 and apply updates promptly once released. 4. Implement input validation and sanitization at higher application layers to prevent malicious URLs from reaching wget2. 5. Employ runtime protections such as stack canaries, ASLR, and DEP (Data Execution Prevention) on systems running wget2 to mitigate exploitation impact. 6. Educate users about the risks of running wget2 on suspicious URLs and enforce policies restricting such actions. 7. Consider using alternative tools or versions without this vulnerability in critical environments until patched. 8. Integrate network-level controls to detect and block suspicious URL requests that could exploit this vulnerability. 9. Conduct regular security assessments and penetration testing focusing on software supply chain and download utilities.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
fedora
Date Reserved
2025-12-29T13:49:33.180Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6960b846ecefc3cd7c11645f

Added to database: 1/9/2026, 8:11:50 AM

Last enriched: 1/16/2026, 9:55:13 AM

Last updated: 2/7/2026, 12:02:08 PM

Views: 73

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats