Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-28497: CWE-190: Integer Overflow or Wraparound in maximmasiutin TinyWeb

0
Critical
VulnerabilityCVE-2026-28497cvecve-2026-28497cwe-190cwe-444
Published: Fri Mar 06 2026 (03/06/2026, 02:51:59 UTC)
Source: CVE Database V5
Vendor/Project: maximmasiutin
Product: TinyWeb

Description

TinyWeb is a web server (HTTP, HTTPS) written in Delphi for Win32. Prior to version 2.03, an integer overflow vulnerability in the string-to-integer conversion routine (_Val) allows an unauthenticated remote attacker to bypass Content-Length restrictions and perform HTTP Request Smuggling. This can lead to unauthorized access, security filter bypass, and potential cache poisoning. The impact is critical for servers using persistent connections (Keep-Alive). This issue has been patched in version 2.03.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 03/06/2026, 03:46:21 UTC

Technical Analysis

CVE-2026-28497 is an integer overflow vulnerability categorized under CWE-190 and CWE-444, found in TinyWeb, a lightweight HTTP/HTTPS server written in Delphi for Win32 platforms. The vulnerability arises from improper handling in the string-to-integer conversion function (_Val), which processes the Content-Length header. When an attacker sends a specially crafted HTTP request with manipulated Content-Length values, the integer overflow causes the server to misinterpret the length of the HTTP body. This misinterpretation enables HTTP Request Smuggling, a technique where attackers send ambiguous or overlapping HTTP requests that bypass security controls, such as firewalls and intrusion detection systems. The consequence is that attackers can gain unauthorized access to protected resources, bypass security filters, and poison caches, potentially affecting downstream users or services. The issue is particularly severe on servers using persistent connections (Keep-Alive), as the request smuggling can manipulate connection reuse and request boundaries. The vulnerability requires no authentication or user interaction, making it highly exploitable remotely. The vendor has addressed this vulnerability in TinyWeb version 2.03 by correcting the integer handling logic to prevent overflow and enforce proper Content-Length validation.

Potential Impact

The impact of CVE-2026-28497 is critical for organizations running vulnerable versions of TinyWeb, especially those relying on persistent HTTP connections. Exploitation can lead to unauthorized access to sensitive data, bypassing of security filters such as web application firewalls, and cache poisoning that can serve malicious content to legitimate users. This undermines the confidentiality, integrity, and availability of web services hosted on TinyWeb. Attackers can leverage this to conduct further attacks, including session hijacking, data exfiltration, or spreading malware. Given that TinyWeb is a specialized web server, the overall scope may be limited compared to more widely deployed servers, but organizations using it in critical environments face significant risk. The lack of authentication and user interaction requirements increases the likelihood of exploitation if the server is internet-facing. Additionally, the ability to bypass Content-Length restrictions can disrupt normal HTTP traffic processing, potentially causing denial of service or instability.

Mitigation Recommendations

Organizations should immediately upgrade TinyWeb to version 2.03 or later, where the vulnerability has been patched. Until the upgrade can be applied, administrators should consider disabling persistent HTTP connections (Keep-Alive) to reduce the risk of request smuggling exploitation. Implementing strict input validation and filtering at perimeter security devices, such as web application firewalls, can help detect and block malformed HTTP requests attempting to exploit this vulnerability. Network segmentation and limiting exposure of TinyWeb servers to untrusted networks will reduce attack surface. Monitoring HTTP traffic for anomalies related to Content-Length headers and unusual request patterns can provide early detection of exploitation attempts. Additionally, conducting regular security assessments and penetration testing focused on HTTP request smuggling can help identify residual risks. Finally, organizations should maintain an inventory of all web servers in use to ensure no vulnerable TinyWeb instances remain in production.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.2
Assigner Short Name
GitHub_M
Date Reserved
2026-02-27T20:57:47.708Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 69aa4a7bc48b3f10ffe32f75

Added to database: 3/6/2026, 3:31:07 AM

Last enriched: 3/6/2026, 3:46:21 AM

Last updated: 4/20/2026, 1:26:18 PM

Views: 70

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses