Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22904: CWE-121 Stack-based Buffer Overflow in WAGO 0852-1322

0
Critical
VulnerabilityCVE-2026-22904cvecve-2026-22904cwe-121
Published: Mon Feb 09 2026 (02/09/2026, 07:40:00 UTC)
Source: CVE Database V5
Vendor/Project: WAGO
Product: 0852-1322

Description

CVE-2026-22904 is a critical stack-based buffer overflow vulnerability in the WAGO 0852-1322 device caused by improper length handling when parsing multiple cookie fields, including TRACKID. This flaw allows an unauthenticated remote attacker to send oversized cookie values to trigger a buffer overflow, potentially leading to denial-of-service or remote code execution. The vulnerability has a CVSS score of 9. 8, indicating a high impact on confidentiality, integrity, and availability without requiring authentication or user interaction. No known exploits are currently reported in the wild. European organizations using WAGO 0852-1322 devices, especially in industrial automation and control systems, are at significant risk. Immediate mitigation involves network segmentation, strict input validation, and monitoring for anomalous traffic. Patch availability is currently not indicated, so compensating controls are critical. Countries with strong industrial automation sectors such as Germany, France, and Italy are most likely to be affected due to the market penetration of WAGO products and the strategic importance of industrial control systems in these regions.

AI-Powered Analysis

AILast updated: 02/09/2026, 08:16:10 UTC

Technical Analysis

CVE-2026-22904 is a stack-based buffer overflow vulnerability identified in the WAGO 0852-1322 device, a product commonly used in industrial automation and control environments. The root cause is improper length handling when parsing multiple HTTP cookie fields, including the TRACKID cookie. An attacker can exploit this by sending specially crafted oversized cookie values to the device's web interface, which does not properly validate or limit the length of these inputs. This leads to a stack buffer overflow (CWE-121), which can cause a denial-of-service (DoS) condition by crashing the device or, more critically, enable remote code execution (RCE). The vulnerability is exploitable remotely without any authentication or user interaction, making it highly dangerous. The CVSS v3.1 score of 9.8 reflects the ease of exploitation (network vector, no privileges required) and the severe impact on confidentiality, integrity, and availability. Although no public exploits are currently known, the critical nature of this vulnerability demands urgent attention. The lack of available patches suggests that organizations must rely on network-level mitigations and monitoring until a vendor fix is released. Given the device’s role in industrial control systems, exploitation could disrupt critical infrastructure operations or allow attackers to gain persistent footholds in operational technology (OT) environments.

Potential Impact

For European organizations, the impact of CVE-2026-22904 is substantial, particularly for those operating in industrial sectors such as manufacturing, energy, and utilities where WAGO 0852-1322 devices are deployed. Successful exploitation could lead to complete device compromise, enabling attackers to disrupt industrial processes, cause physical damage, or exfiltrate sensitive operational data. The resulting denial-of-service could halt production lines or critical infrastructure services, leading to financial losses and safety risks. The potential for remote code execution without authentication increases the threat level, as attackers can gain control over devices from anywhere on the network or potentially from the internet if devices are exposed. This vulnerability also raises compliance and regulatory concerns under frameworks like NIS2 and GDPR, as operational disruptions and data breaches could result in legal penalties. The absence of known exploits currently provides a window for proactive defense, but the critical severity score indicates that threat actors may prioritize developing exploits soon.

Mitigation Recommendations

1. Immediately isolate WAGO 0852-1322 devices from direct internet exposure and restrict access to trusted internal networks only. 2. Implement strict network segmentation between IT and OT environments to limit lateral movement in case of compromise. 3. Deploy Web Application Firewalls (WAFs) or intrusion prevention systems (IPS) capable of detecting and blocking oversized or malformed HTTP cookie fields. 4. Monitor network traffic for unusual cookie sizes or repeated malformed requests targeting the device’s web interface. 5. Enforce strict input validation and filtering at network gateways where possible. 6. Engage with WAGO for official patches or firmware updates and apply them promptly once available. 7. Conduct regular security audits and vulnerability assessments on industrial control systems to identify and remediate similar issues. 8. Develop and test incident response plans specifically addressing OT device compromise scenarios. 9. Educate operational staff about the risks and signs of exploitation attempts. 10. Consider deploying endpoint detection and response (EDR) solutions tailored for OT environments to detect anomalous device behavior.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
CERTVDE
Date Reserved
2026-01-13T08:33:25.683Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 6989944b4b57a58fa134d4d0

Added to database: 2/9/2026, 8:01:15 AM

Last enriched: 2/9/2026, 8:16:10 AM

Last updated: 2/9/2026, 9:03:34 AM

Views: 3

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats