Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22903: CWE-121 Stack-based Buffer Overflow in WAGO 0852-1322

0
Critical
VulnerabilityCVE-2026-22903cvecve-2026-22903cwe-121
Published: Mon Feb 09 2026 (02/09/2026, 07:39:42 UTC)
Source: CVE Database V5
Vendor/Project: WAGO
Product: 0852-1322

Description

CVE-2026-22903 is a critical stack-based buffer overflow vulnerability in the WAGO 0852-1322 device's modified lighttpd server. An unauthenticated remote attacker can exploit this by sending an HTTP request with an excessively long SESSIONID cookie, causing the server to crash and potentially allowing remote code execution. The vulnerability arises due to missing stack protections, making exploitation easier and more impactful. This flaw affects the confidentiality, integrity, and availability of the device and can be triggered without any user interaction or authentication. Although no known exploits are currently in the wild, the high CVSS score of 9. 8 indicates a severe risk. European organizations using WAGO 0852-1322 devices, especially in industrial automation or critical infrastructure, are at significant risk. Immediate mitigation steps include network segmentation, strict input validation, and monitoring for anomalous HTTP requests. Countries with strong industrial sectors and critical infrastructure relying on WAGO products, such as Germany and France, are most likely to be affected.

AI-Powered Analysis

AILast updated: 02/09/2026, 08:16:23 UTC

Technical Analysis

CVE-2026-22903 is a stack-based buffer overflow vulnerability identified in the WAGO 0852-1322 device, which uses a modified version of the lighttpd web server. The vulnerability stems from improper handling of the SESSIONID cookie in HTTP requests. Specifically, when an attacker sends a crafted HTTP request containing an overly long SESSIONID cookie, the server's buffer allocated on the stack is overflowed. This overflow can cause the server process to crash (denial of service) or, more critically, enable remote code execution due to the absence of stack protection mechanisms such as stack canaries or address space layout randomization (ASLR). The vulnerability is exploitable remotely without requiring any authentication or user interaction, increasing its risk profile. The CVSS v3.1 score of 9.8 reflects the high impact on confidentiality, integrity, and availability, combined with the ease of exploitation. The affected product, WAGO 0852-1322, is typically used in industrial automation and control systems, where availability and integrity are paramount. Although no public exploits have been reported yet, the vulnerability's characteristics make it a prime candidate for future exploitation. The lack of available patches at the time of publication necessitates immediate defensive measures to mitigate potential attacks.

Potential Impact

For European organizations, the impact of this vulnerability is significant, especially those operating in industrial automation, manufacturing, and critical infrastructure sectors where WAGO 0852-1322 devices are deployed. Exploitation can lead to complete system compromise, allowing attackers to disrupt operations by crashing devices or executing arbitrary code remotely. This could result in operational downtime, safety risks, data breaches, and potential sabotage of industrial processes. The loss of availability and integrity in control systems can have cascading effects on supply chains and public safety. Confidentiality may also be compromised if attackers gain control and extract sensitive operational data. Given the critical nature of these systems, the vulnerability poses a direct threat to business continuity and national infrastructure security within Europe.

Mitigation Recommendations

1. Immediate network segmentation should be implemented to isolate WAGO 0852-1322 devices from general IT networks and the internet, limiting exposure to untrusted sources. 2. Deploy web application firewalls (WAFs) or intrusion prevention systems (IPS) configured to detect and block HTTP requests with abnormally long cookies or suspicious SESSIONID values. 3. Monitor network traffic for anomalous patterns indicative of exploitation attempts, such as repeated malformed HTTP requests targeting the SESSIONID cookie. 4. Engage with WAGO or authorized vendors to obtain patches or firmware updates as soon as they become available; prioritize patch management for affected devices. 5. Implement strict input validation and rate limiting on devices where possible to reduce the attack surface. 6. Conduct regular security audits and penetration testing focused on industrial control systems to identify and remediate similar vulnerabilities proactively. 7. Maintain up-to-date incident response plans tailored to industrial environments to quickly address potential exploitation events.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2026-01-13T08:33:25.683Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6989944b4b57a58fa134d4cd

Added to database: 2/9/2026, 8:01:15 AM

Last enriched: 2/9/2026, 8:16:23 AM

Last updated: 2/9/2026, 9:02:11 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats