CVE-2026-22318

Severity
4.9MEDIUM
EPSS
0.0%
top 85.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 18

Description

A stack-based buffer overflow vulnerability in the device's file transfer parameter workflow allows a high-privileged attacker to send oversized POST parameters, causing memory corruption in an internal process, resulting in a DoS attack.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:HExploitability: 1.2 | Impact: 3.6

Affected Packages77 packages

CVEListV5phoenix_contact/fl_nat_20080.0.03.53
CVEListV5phoenix_contact/fl_nat_22080.0.03.53
CVEListV5phoenix_contact/fl_switch_20050.0.03.53
CVEListV5phoenix_contact/fl_switch_20080.0.03.53
CVEListV5phoenix_contact/fl_switch_20160.0.03.53

🔴Vulnerability Details

2
GHSA
GHSA-2957-vcfc-fpfc: A stack-based buffer overflow vulnerability in the device's file transfer parameter workflow allows a high-privileged attacker to send oversized POST2026-03-18
CVEList
Stack-Based Buffer Overflow in File Transfer Parameter Handling2026-03-18
CVE-2026-22318 (MEDIUM CVSS 4.9) | A stack-based buffer overflow vulne | cvebase.io