CVE-2026-22319

Severity
4.9MEDIUM
EPSS
0.0%
top 85.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 18

Description

A stack-based buffer overflow in the device's file installation workflow allows a high-privileged attacker to send oversized POST parameters that overflow a fixed-size stack buffer within an internal process, resulting in a DoS attack.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:HExploitability: 1.2 | Impact: 3.6

Affected Packages77 packages

CVEListV5phoenix_contact/fl_nat_20080.0.03.53
CVEListV5phoenix_contact/fl_nat_22080.0.03.53
CVEListV5phoenix_contact/fl_switch_20050.0.03.53
CVEListV5phoenix_contact/fl_switch_20080.0.03.53
CVEListV5phoenix_contact/fl_switch_20160.0.03.53

🔴Vulnerability Details

2
CVEList
Stack-Based Buffer Overflow in File Install Parameter Handling2026-03-18
GHSA
GHSA-7hqw-92qf-g6mp: A stack-based buffer overflow in the device's file installation workflow allows a high-privileged attacker to send oversized POST parameters that over2026-03-18
CVE-2026-22319 (MEDIUM CVSS 4.9) | A stack-based buffer overflow in th | cvebase.io