Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-27630: CWE-400: Uncontrolled Resource Consumption in maximmasiutin TinyWeb

0
High
VulnerabilityCVE-2026-27630cvecve-2026-27630cwe-400
Published: Wed Feb 25 2026 (02/25/2026, 23:05:16 UTC)
Source: CVE Database V5
Vendor/Project: maximmasiutin
Product: TinyWeb

Description

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Versions prior to version 2.02 are vulnerable to a Denial of Service (DoS) attack known as Slowloris. The server spawns a new OS thread for every incoming connection without enforcing a maximum concurrency limit or an appropriate request timeout. An unauthenticated remote attacker can exhaust server concurrency limits and memory by opening numerous connections and sending data exceptionally slowly (e.g. 1 byte every few minutes). Anyone hosting services using TinyWeb is impacted. Version 2.02 fixes the issue. The patch introduces a `CMaxConnections` limit (set to 512) and a `CConnectionTimeoutSecs` idle timeout (set to 30 seconds). As a temporary workaround if upgrading is not immediately possible, consider placing the server behind a robust reverse proxy or Web Application Firewall (WAF) such as nginx, HAProxy, or Cloudflare, configured to buffer incomplete requests and aggressively enforce connection limits and timeouts.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/05/2026, 11:06:57 UTC

Technical Analysis

TinyWeb is a lightweight web server written in Delphi targeting Win32 platforms. Versions before 2.02 are vulnerable to a Denial of Service (DoS) attack classified under CWE-400 (Uncontrolled Resource Consumption). The vulnerability arises because TinyWeb spawns a new operating system thread for every incoming connection without enforcing a maximum concurrency limit or an appropriate request timeout. An attacker can exploit this by opening numerous connections and sending data extremely slowly (e.g., one byte every few minutes), a technique known as Slowloris. This behavior causes the server to consume excessive memory and thread resources, eventually exhausting its capacity and denying service to legitimate users. The vulnerability does not require authentication or user interaction, making it remotely exploitable over the network. The patch in version 2.02 introduces a maximum connection limit (CMaxConnections set to 512) and an idle connection timeout (CConnectionTimeoutSecs set to 30 seconds), effectively mitigating the attack vector. Until upgrading, deploying TinyWeb behind robust reverse proxies or Web Application Firewalls (WAFs) such as nginx, HAProxy, or Cloudflare is recommended. These intermediaries can buffer incomplete requests and enforce aggressive connection limits and timeouts, preventing resource exhaustion on the backend server.

Potential Impact

The primary impact of this vulnerability is a Denial of Service condition, where the TinyWeb server becomes unresponsive due to resource exhaustion caused by numerous slow connections. This can disrupt web services, leading to downtime, loss of availability, and potential reputational damage for organizations relying on TinyWeb. Since the attack requires no authentication and can be launched remotely, it poses a significant risk to any exposed TinyWeb server. The exhaustion of OS threads and memory can also impact other services on the same host, potentially causing broader system instability. Organizations hosting critical applications or services on TinyWeb are particularly vulnerable, as prolonged outages could affect business continuity, customer trust, and compliance with service-level agreements. Although no known exploits are reported in the wild yet, the simplicity and effectiveness of the attack technique suggest a high likelihood of exploitation attempts once widely known.

Mitigation Recommendations

1. Upgrade TinyWeb to version 2.02 or later immediately to apply the built-in fix introducing connection limits and timeouts. 2. If immediate upgrade is not feasible, deploy TinyWeb behind a robust reverse proxy or Web Application Firewall (WAF) such as nginx, HAProxy, or Cloudflare. Configure these intermediaries to buffer incomplete HTTP requests, enforce strict maximum connection limits, and apply aggressive idle connection timeouts (e.g., 30 seconds or less). 3. Monitor server metrics closely for unusual connection patterns or resource usage spikes indicative of Slowloris-style attacks. 4. Implement network-level rate limiting and anomaly detection to identify and block suspicious slow connection attempts. 5. Consider disabling or restricting access to TinyWeb services from untrusted networks or IP ranges to reduce exposure. 6. Regularly audit and update all web-facing infrastructure to ensure timely application of security patches and mitigations.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-20T22:02:30.028Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f8527b7ef31ef0b6936c6

Added to database: 2/25/2026, 11:26:31 PM

Last enriched: 3/5/2026, 11:06:57 AM

Last updated: 4/11/2026, 5:25:38 PM

Views: 96

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses