CVE-2026-2016

A security vulnerability has been detected in happyfish100 libfastcommon up to 1.0.84. Affected by this vulnerability is the function base64_decode of the file src/base64.c. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The identifier of the patch is 82f66af3e252e3e137dba0c3891570f085e79adf. Applying a patch is the recommended action to fix this issue.
Configurations

Configuration 1 (hide)

cpe:2.3:a:happyfish100:libfastcommon:*:*:*:*:*:*:*:*

History

17 Feb 2026, 19:11

Type Values Removed Values Added
References () https://github.com/happyfish100/libfastcommon/ - () https://github.com/happyfish100/libfastcommon/ - Product
References () https://github.com/happyfish100/libfastcommon/commit/82f66af3e252e3e137dba0c3891570f085e79adf - () https://github.com/happyfish100/libfastcommon/commit/82f66af3e252e3e137dba0c3891570f085e79adf - Patch
References () https://github.com/happyfish100/libfastcommon/issues/55 - () https://github.com/happyfish100/libfastcommon/issues/55 - Exploit, Vendor Advisory
References () https://github.com/happyfish100/libfastcommon/issues/55#issue-3836362577 - () https://github.com/happyfish100/libfastcommon/issues/55#issue-3836362577 - Exploit, Vendor Advisory
References () https://github.com/happyfish100/libfastcommon/issues/55#issuecomment-3776757848 - () https://github.com/happyfish100/libfastcommon/issues/55#issuecomment-3776757848 - Exploit, Vendor Advisory
References () https://vuldb.com/?ctiid.344598 - () https://vuldb.com/?ctiid.344598 - Permissions Required, VDB Entry
References () https://vuldb.com/?id.344598 - () https://vuldb.com/?id.344598 - Third Party Advisory, VDB Entry
References () https://vuldb.com/?submit.743873 - () https://vuldb.com/?submit.743873 - Third Party Advisory, VDB Entry
Summary
  • (es) Se ha detectado una vulnerabilidad de seguridad en happyfish100 libfastcommon hasta la versión 1.0.84. Afectada por esta vulnerabilidad es la función base64_decode del archivo src/base64.c. La manipulación conduce a un desbordamiento de búfer basado en pila. Se requiere acceso local para abordar este ataque. El exploit ha sido divulgado públicamente y puede ser utilizado. El identificador del parche es 82f66af3e252e3e137dba0c3891570f085e79adf. Aplicar un parche es la acción recomendada para solucionar este problema.
CPE cpe:2.3:a:happyfish100:libfastcommon:*:*:*:*:*:*:*:*
First Time Happyfish100
Happyfish100 libfastcommon
CWE CWE-787

06 Feb 2026, 12:16

Type Values Removed Values Added
New CVE

Information

Published : 2026-02-06 12:16

Updated : 2026-02-17 19:11


NVD link : CVE-2026-2016

Mitre link : CVE-2026-2016

CVE.ORG link : CVE-2026-2016


JSON object : View

Products Affected

happyfish100

  • libfastcommon
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer

CWE-121

Stack-based Buffer Overflow

CWE-787

Out-of-bounds Write