Vulnerability Description
A security vulnerability has been detected in happyfish100 libfastcommon up to 1.0.84. Affected by this vulnerability is the function base64_decode of the file src/base64.c. The manipulation leads to stack-based buffer overflow. Local access is required to approach this attack. The exploit has been disclosed publicly and may be used. The identifier of the patch is 82f66af3e252e3e137dba0c3891570f085e79adf. Applying a patch is the recommended action to fix this issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Happyfish100 | Libfastcommon | <= 1.0.84 |
Related Weaknesses (CWE)
References
- https://github.com/happyfish100/libfastcommon/Product
- https://github.com/happyfish100/libfastcommon/commit/82f66af3e252e3e137dba0c3891Patch
- https://github.com/happyfish100/libfastcommon/issues/55ExploitVendor Advisory
- https://github.com/happyfish100/libfastcommon/issues/55#issue-3836362577ExploitVendor Advisory
- https://github.com/happyfish100/libfastcommon/issues/55#issuecomment-3776757848ExploitVendor Advisory
- https://vuldb.com/?ctiid.344598Permissions RequiredVDB Entry
- https://vuldb.com/?id.344598Third Party AdvisoryVDB Entry
- https://vuldb.com/?submit.743873Third Party AdvisoryVDB Entry
FAQ
What is CVE-2026-2016?
CVE-2026-2016 is a vulnerability with a CVSS score of 5.3 (MEDIUM). A security vulnerability has been detected in happyfish100 libfastcommon up to 1.0.84. Affected by this vulnerability is the function base64_decode of the file src/base64.c. The manipulation leads to ...
How severe is CVE-2026-2016?
CVE-2026-2016 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2026-2016?
Check the references section above for vendor advisories and patch information. Affected products include: Happyfish100 Libfastcommon.