A flaw was found in GNU Wget2. This vulnerability, a stack-based buffer overflow, occurs in the filename sanitization logic when processing attacker-controlled URL paths, particularly when filename restriction options are active. A remote attacker can exploit this by providing a specially crafted URL, which, upon user interaction with wget2, can lead to memory corruption. This can cause the application to crash and potentially allow for further malicious activities.
References
| Link | Resource |
|---|---|
| https://access.redhat.com/security/cve/CVE-2025-69195 | Third Party Advisory |
| https://bugzilla.redhat.com/show_bug.cgi?id=2425770 | Issue Tracking Third Party Advisory |
Configurations
History
05 Mar 2026, 20:12
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:gnu:wget2:*:*:*:*:*:*:*:* | |
| First Time |
Gnu wget2
Gnu |
|
| References | () https://access.redhat.com/security/cve/CVE-2025-69195 - Third Party Advisory | |
| References | () https://bugzilla.redhat.com/show_bug.cgi?id=2425770 - Issue Tracking, Third Party Advisory |
09 Jan 2026, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-01-09 08:15
Updated : 2026-03-05 20:12
NVD link : CVE-2025-69195
Mitre link : CVE-2025-69195
CVE.ORG link : CVE-2025-69195
JSON object : View
Products Affected
gnu
- wget2
CWE
CWE-121
Stack-based Buffer Overflow
