webfsd 1.21 is vulnerable to a Buffer Overflow via a crafted request. This is due to the filename variable
References
| Link | Resource |
|---|---|
| https://gist.github.com/Err0rzz/3afe49f54e1121b8a08a69801b61cfcc | Exploit Third Party Advisory |
| https://github.com/ourway/webfsd | Product |
Configurations
History
18 Feb 2026, 19:53
| Type | Values Removed | Values Added |
|---|---|---|
| First Time |
Ourway webfsd
Ourway |
|
| CPE | cpe:2.3:a:ourway:webfsd:1.21:*:*:*:*:*:*:* | |
| References | () https://gist.github.com/Err0rzz/3afe49f54e1121b8a08a69801b61cfcc - Exploit, Third Party Advisory | |
| References | () https://github.com/ourway/webfsd - Product |
12 Feb 2026, 20:16
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2026-02-12 20:16
Updated : 2026-02-18 19:53
NVD link : CVE-2025-70314
Mitre link : CVE-2025-70314
CVE.ORG link : CVE-2025-70314
JSON object : View
Products Affected
ourway
- webfsd
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')
