CVE-2026-22319
Received Received - Intake
Stack-Based Buffer Overflow in Device Installer Causes DoS

Publication date: 2026-03-18

Last updated on: 2026-03-18

Assigner: CERT VDE

Description
A stack-based buffer overflow in the device's file installation workflow allows a high-privileged attacker to send oversized POST parameters that overflow a fixed-size stack buffer within an internal process, resulting in a DoS attack.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-03-18
Last Modified
2026-03-18
Generated
2026-05-07
AI Q&A
2026-03-18
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 2 associated CPEs
Vendor Product Version / Range
phoenix_contact fl_switch to 3.53 (exc)
phoenix_contact fl_switch 3.53
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-121 A stack-based buffer overflow condition is a condition where the buffer being overwritten is allocated on the stack (i.e., is a local variable or, rarely, a parameter to a function).
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a stack-based buffer overflow that occurs in the device's file installation workflow. It allows a high-privileged attacker to send oversized POST parameters which overflow a fixed-size stack buffer within an internal process.

The overflow can cause a denial of service (DoS) attack by disrupting the normal operation of the device.


How can this vulnerability impact me? :

The primary impact of this vulnerability is a denial of service (DoS) attack, which can cause the affected device or system to become unavailable or unresponsive.

Since the vulnerability requires a high-privileged attacker and does not affect confidentiality or integrity, the impact is limited to availability.


How does this vulnerability affect compliance with common standards and regulations (like GDPR, HIPAA)?:

I don't know


How can this vulnerability be detected on my network or system? Can you suggest some commands?

I don't know


What immediate steps should I take to mitigate this vulnerability?

I don't know


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart